Date
1 - 1 of 1
Zephyr v2.7.3 LTS Release
Christopher Friedt <chrisfriedt@...>
Hi Zephyr Community!
Zephyr v2.7.3 is out! This release is codenamed "Parks and Recreation", for reasons.. Please enjoy responsibly. https://github.com/zephyrproject-rtos/zephyr/releases/tag/v2.7.3 A few bugfixes are included in this release: * 39882 - Bluetooth Host qualification on 2.7 branch * 41074 - can_mcan_send sends corrupted CAN frames with a byte-by-byte memcpy implementation * 43479 - Bluetooth: Controller: Fix per adv scheduling issue * 43694 - drivers: spi: stm32 spi with dma must enable cs after periph * 44089 - logging: shell backend: null-deref when logs are dropped * 45341 - Add new EHL SKUs for IBECC * 45529 - GdbStub get_mem_region bugfix * 46621 - drivers: i2c: Infinite recursion in driver unregister function * 46698 - sm351 driver faults when using global thread * 46706 - add missing checks for segment number * 46757 - Bluetooth: Controller: Missing validation of unsupported PHY when performing PHY update * 46807 - lib: posix: semaphore: use consistent timebase in sem_timedwait * 46822 - L2CAP disconnected packet timing in ecred reconf function * 46994 - Incorrect Xtensa toolchain path resolution * 47356 - cpp: global static object initialisation may fail for MMU and MPU platforms * 47609 - posix: pthread: descriptor leak with pthread_join * 47955 - drivers: can: various RTR fixes * 48249 - boards: nucleo_wb55rg: documentation BLE binary compatibility issue * 48271 - net: Possible net_pkt leak in ipv6 multicast forwarding Security Vulnerabilities Addressed: * CVE-2022-2741: Under embargo until 2022-10-14 * CVE-2022-1042 * CVE-2022-1041 * CVE-2021-3966 More detailed information can be found in: https://docs.zephyrproject.org/latest/security/vulnerabilities.html Cheers, C |
|