An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
The product compares two entities in a security-relevant context, but the comparison is incorrect, which may lead to resultant weaknesses.
Link | Tags |
---|---|
https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35 | third party advisory |
https://github.com/zephyrproject-rtos/zephyr/pull/23328 | third party advisory patch |
https://github.com/zephyrproject-rtos/zephyr/pull/23500 | third party advisory patch |
https://github.com/zephyrproject-rtos/zephyr/pull/23499 | third party advisory patch |
https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10027 |