← Retour aux CVEs
CVE-2020-10067
HIGH7.5
Description
A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers. The impact would depend on the underlying system call and can range from denial of service to information leak to memory corruption resulting in code execution within the kernel. See NCC-ZEP-005 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
Details CVE
Score CVSS v3.17.5
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteHIGH
Privileges requisLOW
Interaction utilisateurREQUIRED
Publie5/11/2020
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
zephyrproject:zephyr
Faiblesses (CWE)
CWE-190CWE-190
References
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10067(vulnerabilities@zephyrproject.org)
https://github.com/zephyrproject-rtos/zephyr/pull/23239(vulnerabilities@zephyrproject.org)
https://github.com/zephyrproject-rtos/zephyr/pull/23653(vulnerabilities@zephyrproject.org)
https://github.com/zephyrproject-rtos/zephyr/pull/23654(vulnerabilities@zephyrproject.org)
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27(vulnerabilities@zephyrproject.org)
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10067(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/zephyrproject-rtos/zephyr/pull/23239(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/zephyrproject-rtos/zephyr/pull/23653(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/zephyrproject-rtos/zephyr/pull/23654(af854a3a-2127-422b-91ae-364da2661108)
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.