Description
The arm platform-specific code uses a signed integer comparison when validating system call numbers. An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-2489 | The arm platform-specific code uses a signed integer comparison when validating system call numbers. An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions. |
References
History
No history.
Status: PUBLISHED
Assigner: zephyr
Published:
Updated: 2024-09-17T01:56:05.691Z
Reserved: 2020-03-03T00:00:00.000Z
Link: CVE-2020-10024
No data.
Status : Modified
Published: 2020-05-11T23:15:11.583
Modified: 2024-11-21T04:54:40.487
Link: CVE-2020-10024
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD