Null pointer dereference in the MsgRegisterEvent() system call could allow an attacker with local access and code execution abilities to crash the QNX Neutrino kernel.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://support.blackberry.com/pkb/s/article/141027 |
|
History
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Blackberry
Blackberry qnx Os For Safety Blackberry qnx Software Development Platform |
|
| Vendors & Products |
Blackberry
Blackberry qnx Os For Safety Blackberry qnx Software Development Platform |
Tue, 13 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A null pointer dereference vulnerability in the MsgRegisterEvent() system call of the QNX Neutrino Kernel in QNX SDP 7.1 and 7.0, and QNX OS for Safety 2.2, 2.1 and 2.0 could potentially allow an attacker with local access and code execution abilities, to crash the QNX Neutrino kernel. | Null pointer dereference in the MsgRegisterEvent() system call could allow an attacker with local access and code execution abilities to crash the QNX Neutrino kernel. |
Tue, 13 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A null pointer dereference vulnerability in the MsgRegisterEvent() system call of the QNX Neutrino Kernel in QNX SDP 7.1 and 7.0, and QNX OS for Safety 2.2, 2.1 and 2.0 could potentially allow an attacker with local access and code execution abilities, to crash the QNX Neutrino kernel. | |
| Title | Vulnerability in the QNX Neutrino Kernel impacts the QNX Software Development Platform and QNX OS for Safety | |
| Weaknesses | CWE-476 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: blackberry
Published: 2026-01-13T16:36:21.061Z
Updated: 2026-01-13T21:41:51.831Z
Reserved: 2025-07-23T15:38:00.519Z
Link: CVE-2025-8090
Updated: 2026-01-13T21:41:48.837Z
Status : Awaiting Analysis
Published: 2026-01-13T17:15:59.320
Modified: 2026-01-14T16:25:40.430
Link: CVE-2025-8090
No data.