In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control
parameters of __portable_aligned_alloc() could cause an integer
wrap-around and an allocation smaller than expected. This could cause
subsequent heap buffer overflows.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2024/May/35 | Mailing List |
http://seclists.org/fulldisclosure/2024/May/35 | Mailing List |
http://www.openwall.com/lists/oss-security/2024/05/28/1 | Mailing List |
http://www.openwall.com/lists/oss-security/2024/05/28/1 | Mailing List |
https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-h963-7vhw-8rpx | Patch Vendor Advisory |
https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-h963-7vhw-8rpx | Patch Vendor Advisory |
Configurations
History
13 Feb 2025, 18:17
Type | Values Removed | Values Added |
---|---|---|
Summary | In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control parameters of __portable_aligned_alloc() could cause an integer wrap-around and an allocation smaller than expected. This could cause subsequent heap buffer overflows. |
06 Feb 2025, 18:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Eclipse threadx Netx Duo
Eclipse |
|
CWE | CWE-190 | |
References | () http://seclists.org/fulldisclosure/2024/May/35 - Mailing List | |
References | () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-h963-7vhw-8rpx - Patch, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/05/28/1 - Mailing List | |
CPE | cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:* |
10 Jun 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Mar 2024, 17:09
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-26 16:15
Updated : 2025-02-13 18:17
NVD link : CVE-2024-2452
Mitre link : CVE-2024-2452
JSON object : View
Products Affected
eclipse
- threadx_netx_duo
CWE
CWE-190
Integer Overflow or Wraparound