diff --git a/2020/10xxx/CVE-2020-10019.json b/2020/10xxx/CVE-2020-10019.json index d92047cadf2..41e21be9b3a 100644 --- a/2020/10xxx/CVE-2020-10019.json +++ b/2020/10xxx/CVE-2020-10019.json @@ -47,7 +47,7 @@ "description_data": [ { "lang": "eng", - "value": "USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow.\n\nSee NCC-ZEP-002\nThis issue affects:\nzephyrproject-rtos zephyr\nversion 1.14.1 and later versions.\nversion 2.1.0 and later versions." + "value": "USB DFU has a potential buffer overflow where the requested length (wLength) is not checked against the buffer size. This could be used by a malicious USB host to exploit the buffer overflow. See NCC-ZEP-002 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions." } ] }, @@ -85,24 +85,29 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25" + "refsource": "MISC", + "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25", + "name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-25" }, { - "refsource": "CONFIRM", - "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10019" + "refsource": "MISC", + "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10019", + "name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10019" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23190" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23190", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23190" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23457" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23457", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23457" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23460" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23460", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23460" } ] }, @@ -112,4 +117,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10021.json b/2020/10xxx/CVE-2020-10021.json index 95cfe810349..9c626d432c8 100644 --- a/2020/10xxx/CVE-2020-10021.json +++ b/2020/10xxx/CVE-2020-10021.json @@ -47,7 +47,7 @@ "description_data": [ { "lang": "eng", - "value": "Out-of-bounds Write in the USB Mass Storage memoryWrite handler with unaligned Sizes\n\nSee NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026\nThis issue affects:\nzephyrproject-rtos zephyr\nversion 1.14.1 and later versions.\nversion 2.1.0 and later versions." + "value": "Out-of-bounds Write in the USB Mass Storage memoryWrite handler with unaligned Sizes See NCC-ZEP-024, NCC-ZEP-025, NCC-ZEP-026 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions." } ] }, @@ -85,24 +85,29 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26" + "refsource": "MISC", + "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26", + "name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-26" }, { - "refsource": "CONFIRM", - "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10021" + "refsource": "MISC", + "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10021", + "name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10021" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23240" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23240", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23240" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23455" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23455", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23455" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23456" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23456", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23456" } ] }, @@ -112,4 +117,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10022.json b/2020/10xxx/CVE-2020-10022.json index e34c6faa3ea..b48e8f870a4 100644 --- a/2020/10xxx/CVE-2020-10022.json +++ b/2020/10xxx/CVE-2020-10022.json @@ -47,7 +47,7 @@ "description_data": [ { "lang": "eng", - "value": "A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case.\n\nSee NCC-NCC-016\nThis issue affects:\nzephyrproject-rtos zephyr\nversion 2.1.0 and later versions.\nversion 2.2.0 and later versions." + "value": "A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions." } ] }, @@ -85,24 +85,29 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28" + "refsource": "MISC", + "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28", + "name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28" }, { - "refsource": "CONFIRM", - "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10022" + "refsource": "MISC", + "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10022", + "name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10022" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24154" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24154", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/24154" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24065" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24065", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/24065" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24066" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24066", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/24066" } ] }, @@ -112,4 +117,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10023.json b/2020/10xxx/CVE-2020-10023.json index 8e4f76bbae2..b941d8b71ea 100644 --- a/2020/10xxx/CVE-2020-10023.json +++ b/2020/10xxx/CVE-2020-10023.json @@ -47,7 +47,7 @@ "description_data": [ { "lang": "eng", - "value": "The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel.\n\nSee NCC-NCC-019\nThis issue affects:\nzephyrproject-rtos zephyr\nversion 1.14.0 and later versions.\nversion 2.1.0 and later versions." + "value": "The shell subsystem contains a buffer overflow, whereby an adversary with physical access to the device is able to cause a memory corruption, resulting in denial of service or possibly code execution within the Zephyr kernel. See NCC-NCC-019 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions." } ] }, @@ -85,24 +85,29 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29" + "refsource": "MISC", + "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29", + "name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-29" }, { - "refsource": "CONFIRM", - "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10023" + "refsource": "MISC", + "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10023", + "name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10023" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23304" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23304", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23304" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23646" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23646", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23646" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23649" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23649", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23649" } ] }, @@ -112,4 +117,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10024.json b/2020/10xxx/CVE-2020-10024.json index bcbc8af44b3..ab84d5b9e26 100644 --- a/2020/10xxx/CVE-2020-10024.json +++ b/2020/10xxx/CVE-2020-10024.json @@ -47,7 +47,7 @@ "description_data": [ { "lang": "eng", - "value": "The arm platform-specific code uses a signed integer comparison when validating system call numbers. An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel.\n\nSee NCC-ZEP-001\nThis issue affects:\nzephyrproject-rtos zephyr\nversion 1.14.0 and later versions.\nversion 2.1.0 and later versions." + "value": "The arm platform-specific code uses a signed integer comparison when validating system call numbers. An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions." } ] }, @@ -85,24 +85,29 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30" + "refsource": "MISC", + "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30", + "name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-30" }, { - "refsource": "CONFIRM", - "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10024" + "refsource": "MISC", + "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10024", + "name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10024" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23323" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23323", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23323" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23535" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23535", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23535" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23498" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23498", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23498" } ] }, @@ -112,4 +117,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10025.json b/2020/10xxx/CVE-2020-10025.json index 7ccbfc2efdb..c4acb3d0183 100644 --- a/2020/10xxx/CVE-2020-10025.json +++ b/2020/10xxx/CVE-2020-10025.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-10025", - "ASSIGNER": "vulnerabilities@zephyrproject.org", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10026.json b/2020/10xxx/CVE-2020-10026.json index 7566166624f..cf95a66e21c 100644 --- a/2020/10xxx/CVE-2020-10026.json +++ b/2020/10xxx/CVE-2020-10026.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-10026", - "ASSIGNER": "vulnerabilities@zephyrproject.org", + "ASSIGNER": "cve@mitre.org", "STATE": "REJECT" }, "description": { @@ -15,4 +15,4 @@ } ] } -} +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10027.json b/2020/10xxx/CVE-2020-10027.json index 95fa910fb15..d345c072146 100644 --- a/2020/10xxx/CVE-2020-10027.json +++ b/2020/10xxx/CVE-2020-10027.json @@ -47,7 +47,7 @@ "description_data": [ { "lang": "eng", - "value": "An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel.\n\nSee NCC-ZEP-001\nThis issue affects:\nzephyrproject-rtos zephyr\nversion 1.14.0 and later versions.\nversion 2.1.0 and later versions." + "value": "An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions." } ] }, @@ -85,24 +85,29 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35" + "refsource": "MISC", + "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35", + "name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35" }, { - "refsource": "CONFIRM", - "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10027" + "refsource": "MISC", + "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10027", + "name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10027" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23328" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23328", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23328" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23500" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23500", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23500" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23499" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23499", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23499" } ] }, @@ -112,4 +117,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10028.json b/2020/10xxx/CVE-2020-10028.json index 02272db1cd9..a6a440586e4 100644 --- a/2020/10xxx/CVE-2020-10028.json +++ b/2020/10xxx/CVE-2020-10028.json @@ -47,7 +47,7 @@ "description_data": [ { "lang": "eng", - "value": "Multiple syscalls with insufficient argument validation\n\nSee NCC-ZEP-006\nThis issue affects:\nzephyrproject-rtos zephyr\nversion 1.14.0 and later versions.\nversion 2.1.0 and later versions." + "value": "Multiple syscalls with insufficient argument validation See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions." } ] }, @@ -85,24 +85,29 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-32" + "refsource": "MISC", + "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-32", + "name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-32" }, { - "refsource": "CONFIRM", - "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10028" + "refsource": "MISC", + "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10028", + "name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10028" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23308" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23308", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23308" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23733" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23733", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23733" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23737" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23737", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23737" } ] }, @@ -112,4 +117,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10058.json b/2020/10xxx/CVE-2020-10058.json index fc70a2560c6..b883eab2c95 100644 --- a/2020/10xxx/CVE-2020-10058.json +++ b/2020/10xxx/CVE-2020-10058.json @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges.\n\nSee NCC-ZEP-006\nThis issue affects:\nzephyrproject-rtos zephyr\nversion 2.1.0 and later versions." + "value": "Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges. See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions." } ] }, @@ -81,20 +81,24 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-34" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23308", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23308" }, { - "refsource": "CONFIRM", - "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10058" + "refsource": "MISC", + "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-34", + "name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-34" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23308" + "refsource": "MISC", + "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10058", + "name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10058" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23748" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23748", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23748" } ] }, @@ -104,4 +108,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10059.json b/2020/10xxx/CVE-2020-10059.json index 8fc85694247..be6bd2a29af 100644 --- a/2020/10xxx/CVE-2020-10059.json +++ b/2020/10xxx/CVE-2020-10059.json @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack. This is mitigated by firmware images requiring valid signatures. However, there is no benefit to using DTLS without the peer checking.\n\nSee NCC-ZEP-018\nThis issue affects:\nzephyrproject-rtos zephyr\nversion 2.1.0 and later versions." + "value": "The UpdateHub module disables DTLS peer checking, which allows for a man in the middle attack. This is mitigated by firmware images requiring valid signatures. However, there is no benefit to using DTLS without the peer checking. See NCC-ZEP-018 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions." } ] }, @@ -81,24 +81,29 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36" + "refsource": "MISC", + "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36", + "name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-36" }, { - "refsource": "CONFIRM", - "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10059" + "refsource": "MISC", + "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10059", + "name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10059" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24954" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24954", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/24954" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24999" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24999", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/24999" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24997" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/24997", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/24997" } ] }, @@ -108,4 +113,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10060.json b/2020/10xxx/CVE-2020-10060.json index fc05ce069d4..22753daec29 100644 --- a/2020/10xxx/CVE-2020-10060.json +++ b/2020/10xxx/CVE-2020-10060.json @@ -47,7 +47,7 @@ "description_data": [ { "lang": "eng", - "value": "In updatehub_probe, right after JSON parsing is complete, objects\\[1] is accessed from the output structure in two different places. If the JSON contained less than two elements, this access would reference unitialized stack memory. This could result in a crash, denial of service, or possibly an information leak.\n\nRecommend disabling updatehub until such a time as a fix can be made available. Provided the fix in CVE-2020-10059 is applied, the attack requires compromise of the server.\n\nSee NCC-ZEP-030\nThis issue affects:\nzephyrproject-rtos zephyr\nversion 2.1.0 and later versions.\nversion 2.2.0 and later versions." + "value": "In updatehub_probe, right after JSON parsing is complete, objects\\[1] is accessed from the output structure in two different places. If the JSON contained less than two elements, this access would reference unitialized stack memory. This could result in a crash, denial of service, or possibly an information leak. Recommend disabling updatehub until such a time as a fix can be made available. Provided the fix in CVE-2020-10059 is applied, the attack requires compromise of the server. See NCC-ZEP-030 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions." } ] }, @@ -85,12 +85,14 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37" + "refsource": "MISC", + "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37", + "name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-37" }, { - "refsource": "CONFIRM", - "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10060" + "refsource": "MISC", + "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10060", + "name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10060" } ] }, @@ -100,4 +102,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file diff --git a/2020/10xxx/CVE-2020-10067.json b/2020/10xxx/CVE-2020-10067.json index d18c8da36be..6b40fe7fab3 100644 --- a/2020/10xxx/CVE-2020-10067.json +++ b/2020/10xxx/CVE-2020-10067.json @@ -47,7 +47,7 @@ "description_data": [ { "lang": "eng", - "value": "A malicious userspace application can cause a integer overflow and bypass security checks performed by\nsystem call handlers. The impact would depend on the underlying system call and can range\nfrom denial of service to information leak to memory corruption resulting in code execution\nwithin the kernel.\n\nSee NCC-ZEP-005\nThis issue affects:\nzephyrproject-rtos zephyr\nversion 1.14.1 and later versions.\nversion 2.1.0 and later versions." + "value": "A malicious userspace application can cause a integer overflow and bypass security checks performed by system call handlers. The impact would depend on the underlying system call and can range from denial of service to information leak to memory corruption resulting in code execution within the kernel. See NCC-ZEP-005 This issue affects: zephyrproject-rtos zephyr version 1.14.1 and later versions. version 2.1.0 and later versions." } ] }, @@ -85,24 +85,29 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27" + "refsource": "MISC", + "url": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27", + "name": "https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-27" }, { - "refsource": "CONFIRM", - "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10067" + "refsource": "MISC", + "url": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10067", + "name": "https://docs.zephyrproject.org/latest/security/vulnerabilities.html#CVE-2020-10067" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23239" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23239", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23239" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23653" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23653", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23653" }, { - "refsource": "CONFIRM", - "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23654" + "refsource": "MISC", + "url": "https://github.com/zephyrproject-rtos/zephyr/pull/23654", + "name": "https://github.com/zephyrproject-rtos/zephyr/pull/23654" } ] }, @@ -112,4 +117,4 @@ ], "discovery": "EXTERNAL" } -} +} \ No newline at end of file