A malformed JSON payload that is received from an UpdateHub server may trigger memory corruption in the Zephyr OS. This could result in a denial of service in the best case, or code execution in the worst case. See NCC-NCC-016 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions. version 2.2.0 and later versions.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-28 | third party advisory |
https://github.com/zephyrproject-rtos/zephyr/pull/24154 | third party advisory patch |
https://github.com/zephyrproject-rtos/zephyr/pull/24065 | third party advisory patch |
https://github.com/zephyrproject-rtos/zephyr/pull/24066 | third party advisory patch |
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10022 |