First published: Fri May 01 2020(Updated: )
A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers. The impact would depend on the underlying system call and can range from denial of service to information leak to memory corruption resulting in code execution within the kernel. See NCC-ZEP-005 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions.
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyr Project Manager | =1.14.1 | |
Zephyr Project Manager | =2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10067 is considered a high-severity vulnerability due to potential impacts such as denial of service, information leaks, and memory corruption.
To mitigate CVE-2020-10067, update your Zephyr Project software to versions 1.14.2 or later and 2.1.1 or later.
CVE-2020-10067 affects Zephyr Project versions 1.14.1 and 2.1.0.
Exploitation of CVE-2020-10067 can lead to denial of service, potential information leakage, and memory corruption that may allow arbitrary code execution.
Developers and organizations using the affected versions of the Zephyr Project should be concerned about CVE-2020-10067.