First published: Wed Feb 03 2021(Updated: )
In Wind River VxWorks, memory allocator has a possible overflow in calculating the memory block's size to be allocated by calloc(). As a result, the actual memory allocated is smaller than the buffer size specified by the arguments, leading to memory corruption.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wind River VxWorks | >=6.9<6.9.4.12 | |
Wind River VxWorks | =6.9.4.12 | |
Wind River VxWorks | =6.9.4.12-rolling_cumulative_patch_layer1 | |
oracle communications eagle | >=46.8.0<=48.6.2 | |
oracle communications eagle | >=46.9.1<=46.9.3 | |
oracle communications eagle | =46.7.0 | |
Amazon FreeRTOS | ||
Apache NuttX | ||
ARM CMSIS-RTOS2 | ||
Arm Mbed OS | ||
Arm Mbed ualloc | ||
QNX | ||
BlackBerry QNX OS for Safety | ||
BlackBerry QNX OS for Medical | ||
QNX | ||
Mongoose OS | ||
eCosCentric eCosPro RTOS | ||
Google Cloud IoT Device SDK | ||
MediaTek LinkIt SDK | ||
Micrium OS | ||
Micrium uC/OS | ||
NXP MCUXpresso SDK | ||
NXP MQX | ||
newlib | ||
RIOT OS | ||
Samsung Tizen RT | ||
TencentOS-tiny | ||
Texas Instruments SimpleLink CC32XX | ||
Texas Instruments SimpleLink MSP432E4 SDK | ||
Texas Instruments SimpleLink CC13X2 SDK | ||
Texas Instruments SimpleLink CC26XX | ||
Texas Instruments SimpleLink CC32XX | ||
uClibc | ||
Wind River VxWorks | ||
Zephyr Project RTOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-28895.
The severity of CVE-2020-28895 is high with a CVSS score of 7.3.
Wind River VxWorks versions 6.9 to 6.9.4.12, Wind River VxWorks version 6.9.4.12 with rolling cumulative patch layer 1, Oracle Communications Eagle versions 46.7.0 to 48.6.2 are affected by CVE-2020-28895.
The vulnerability could lead to memory corruption, potentially causing system instability and unauthorized access to sensitive information.
Yes, Wind River has released patches and updates to address the vulnerability. It is recommended to apply the latest updates provided by the vendor.