zephyr-rtos version 1.12.0 contains a NULL base pointer reference vulnerability in sys_ring_buf_put(), sys_ring_buf_get() that can result in CPU Page Fault (error code 0x00000010). This attack appear to be exploitable via a malicious application call the vulnerable kernel APIs (system sys_ring_buf_get() and sys_ring_buf_put).
                
            Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2018-2004 | zephyr-rtos version 1.12.0 contains a NULL base pointer reference vulnerability in sys_ring_buf_put(), sys_ring_buf_get() that can result in CPU Page Fault (error code 0x00000010). This attack appear to be exploitable via a malicious application call the vulnerable kernel APIs (system sys_ring_buf_get() and sys_ring_buf_put). | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        | Link | Providers | 
|---|---|
| https://github.com/zephyrproject-rtos/zephyr/issues/7638 | 
                     | 
            
History
                    No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T01:31:49.523Z
Reserved: 2018-09-06T00:00:00Z
Link: CVE-2018-1000800
No data.
Status : Modified
Published: 2018-09-06T17:29:02.097
Modified: 2024-11-21T03:40:22.867
Link: CVE-2018-1000800
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD