First published: Wed Sep 27 2023(Updated: )
Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers.
Credit: vulnerabilities@zephyrproject.org vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyrproject Zephyr | <=3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5184 is high with a severity value of 8.8.
Zephyr IPM drivers version up to and including 3.4.0 are affected by CVE-2023-5184.
CVE-2023-5184 includes two potential signed to unsigned conversion errors and buffer overflow vulnerabilities in the Zephyr IPM drivers.
To fix CVE-2023-5184, it is recommended to update the Zephyr IPM drivers to a version higher than 3.4.0.
You can find more information about CVE-2023-5184 on the [Zephyr Project GitHub security advisory](https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8x3p-q3r5-xh9g) page.