Zephyr v2.7.3 LTS Release


Christopher Friedt
 

Hi Zephyr Community!

Zephyr v2.7.3 is out! This release is codenamed "Parks and
Recreation", for reasons.. Please enjoy responsibly.

https://github.com/zephyrproject-rtos/zephyr/releases/tag/v2.7.3

A few bugfixes are included in this release:

* 39882 - Bluetooth Host qualification on 2.7 branch
* 41074 - can_mcan_send sends corrupted CAN frames with a byte-by-byte
memcpy implementation
* 43479 - Bluetooth: Controller: Fix per adv scheduling issue
* 43694 - drivers: spi: stm32 spi with dma must enable cs after periph
* 44089 - logging: shell backend: null-deref when logs are dropped
* 45341 - Add new EHL SKUs for IBECC
* 45529 - GdbStub get_mem_region bugfix
* 46621 - drivers: i2c: Infinite recursion in driver unregister function
* 46698 - sm351 driver faults when using global thread
* 46706 - add missing checks for segment number
* 46757 - Bluetooth: Controller: Missing validation of unsupported PHY
when performing PHY update
* 46807 - lib: posix: semaphore: use consistent timebase in sem_timedwait
* 46822 - L2CAP disconnected packet timing in ecred reconf function
* 46994 - Incorrect Xtensa toolchain path resolution
* 47356 - cpp: global static object initialisation may fail for MMU
and MPU platforms
* 47609 - posix: pthread: descriptor leak with pthread_join
* 47955 - drivers: can: various RTR fixes
* 48249 - boards: nucleo_wb55rg: documentation BLE binary compatibility issue
* 48271 - net: Possible net_pkt leak in ipv6 multicast forwarding

Security Vulnerabilities Addressed:

* CVE-2022-2741: Under embargo until 2022-10-14
* CVE-2022-1042
* CVE-2022-1041
* CVE-2021-3966

More detailed information can be found in:
https://docs.zephyrproject.org/latest/security/vulnerabilities.html

Cheers,

C