← Zuruck zu CVEs
CVE-2020-10067
HIGH7.5
Beschreibung
A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers. The impact would depend on the underlying system call and can range from denial of service to information leak to memory corruption resulting in code execution within the kernel. See NCC-ZEP-005 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
CVE Details
CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatHIGH
Erforderliche PrivilegienLOW
BenutzerinteraktionREQUIRED
Veroffentlicht5/11/2020
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
zephyrproject:zephyr
Schwachen (CWE)
CWE-190CWE-190
Referenzen
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10067(vulnerabilities@zephyrproject.org)
https://github.com/zephyrproject-rtos/zephyr/pull/23239(vulnerabilities@zephyrproject.org)
https://github.com/zephyrproject-rtos/zephyr/pull/23653(vulnerabilities@zephyrproject.org)
https://github.com/zephyrproject-rtos/zephyr/pull/23654(vulnerabilities@zephyrproject.org)
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27(vulnerabilities@zephyrproject.org)
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10067(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/zephyrproject-rtos/zephyr/pull/23239(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/zephyrproject-rtos/zephyr/pull/23653(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/zephyrproject-rtos/zephyr/pull/23654(af854a3a-2127-422b-91ae-364da2661108)
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.