First published: Sun Feb 18 2024(Updated: )
Signed to unsigned conversion esp32_ipm_send
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyr Project Manager | <3.5.0 | |
Zephyr Project Manager | =3.5.0 | |
Zephyr Project Manager | =3.5.0-rc1 | |
Zephyr Project Manager | =3.5.0-rc2 | |
Zephyr Project Manager | =3.5.0-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6249 carries a high severity rating due to the potential for signed to unsigned conversion vulnerabilities leading to unexpected behavior.
To fix CVE-2023-6249, update your Zephyr Project software to a version above 3.5.0.
CVE-2023-6249 affects Zephyr versions up to and including 3.5.0 and its release candidates 3.5.0-rc1, 3.5.0-rc2, and 3.5.0-rc3.
CVE-2023-6249 is caused by a vulnerability in the esp32_ipm_send function that allows signed to unsigned conversion.
CVE-2023-6249 can lead to compromised data integrity and system stability in affected applications.