CVE-2020-10060

In updatehub_probe, right after JSON parsing is complete, objects\[1] is accessed from the output structure in two different places. If the JSON contained less than two elements, this access would reference unitialized stack memory. This could result in a crash, denial of service, or possibly an information leak. Provided the fix in CVE-2020-10059 is applied, the attack requires compromise of the server. See NCC-ZEP-030 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.
Configurations

Configuration 1 (hide)

cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-05-11 23:15

Updated : 2024-02-28 17:47


NVD link : CVE-2020-10060

Mitre link : CVE-2020-10060

CVE.ORG link : CVE-2020-10060


JSON object : View

Products Affected

zephyrproject

  • zephyr
CWE
CWE-824

Access of Uninitialized Pointer

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer