Get a Pentest and security assessment of your IT network.

2021-current

CVE-2020-10060 – In updatehub_probe, right after JSON parsing is complete, objects[1] is

In updatehub_probe, right after JSON parsing is complete, objects[1] is accessed from the output structure in two different places. If the JSON contained less than two elements, this access would reference unitialized stack memory. This could result in a crash, denial of service, or possibly an information leak. Provided the fix in CVE-2020-10059 is applied, the attack requires compromise of the server. See NCC-ZEP-030 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.

 

Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10060

Reference (s):

  • https://github.com/zephyrproject-rtos/zephyr/pull/27865
  • URL: https://github.com/zephyrproject-rtos/zephyr/pull/27865
  • https://github.com/zephyrproject-rtos/zephyr/pull/27889
  • URL: https://github.com/zephyrproject-rtos/zephyr/pull/27889
  • https://github.com/zephyrproject-rtos/zephyr/pull/27891
Related posts
2021-current

CVE-2004-1715 - Directory traversal vulnerability in MIMEsweeper for Web before 5.0.4 all

2021-current

CVE-2014-9235 - Multiple SQL injection vulnerabilities in Zoph (aka Zoph Organizes Photos

2021-current

CVE-2020-0828 - A remote code execution vulnerability exists in the way that the ChakraCo

2021-current

CVE-2020-14828 - Vulnerability in the MySQL Server product of Oracle MySQL (component: Ser