In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control
parameters of __portable_aligned_alloc() could cause an integer
wrap-around and an allocation smaller than expected. This could cause
subsequent heap buffer overflows.
References
| Link | Resource |
|---|---|
| http://seclists.org/fulldisclosure/2024/May/35 | Mailing List |
| http://www.openwall.com/lists/oss-security/2024/05/28/1 | Mailing List |
| https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-h963-7vhw-8rpx | Patch Vendor Advisory |
| http://seclists.org/fulldisclosure/2024/May/35 | Mailing List |
| http://www.openwall.com/lists/oss-security/2024/05/28/1 | Mailing List |
| https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-h963-7vhw-8rpx | Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-03-26 16:15
Updated : 2025-02-13 18:17
NVD link : CVE-2024-2452
Mitre link : CVE-2024-2452
CVE.ORG link : CVE-2024-2452
JSON object : View
Products Affected
eclipse
- threadx_netx_duo
