CVE-2024-2452

In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control parameters of __portable_aligned_alloc() could cause an integer wrap-around and an allocation smaller than expected. This could cause subsequent heap buffer overflows.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*

History

13 Feb 2025, 18:17

Type Values Removed Values Added
Summary (en) In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control parameters of __portable_aligned_alloc() could cause an integer wrap-around and an allocation smaller than expected. This could cause subsequent heap buffer overflows. (en) In Eclipse ThreadX NetX Duo before 6.4.0, if an attacker can control parameters of __portable_aligned_alloc() could cause an integer wrap-around and an allocation smaller than expected. This could cause subsequent heap buffer overflows.

06 Feb 2025, 18:05

Type Values Removed Values Added
CPE cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*
First Time Eclipse threadx Netx Duo
Eclipse
References () http://seclists.org/fulldisclosure/2024/May/35 - () http://seclists.org/fulldisclosure/2024/May/35 - Mailing List
References () http://www.openwall.com/lists/oss-security/2024/05/28/1 - () http://www.openwall.com/lists/oss-security/2024/05/28/1 - Mailing List
References () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-h963-7vhw-8rpx - () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-h963-7vhw-8rpx - Patch, Vendor Advisory

Information

Published : 2024-03-26 16:15

Updated : 2025-02-13 18:17


NVD link : CVE-2024-2452

Mitre link : CVE-2024-2452

CVE.ORG link : CVE-2024-2452


JSON object : View

Products Affected

eclipse

  • threadx_netx_duo
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-190

Integer Overflow or Wraparound