First published: Sun Feb 18 2024(Updated: )
Unchecked length coming from user input in settings shell
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyr Project Manager | <=3.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-6749 is currently rated as moderate due to potential denial of service or data corruption risks.
To fix CVE-2023-6749, ensure to validate and sanitize user input length in the Zephyr Settings Shell before processing.
CVE-2023-6749 affects all versions of Zephyr up to and including version 3.5.0.
Yes, CVE-2023-6749 can potentially be exploited to cause unexpected behavior in applications using the affected software.
Yes, details regarding CVE-2023-6749, including fixes and affected versions, can be found in the public advisory on the Zephyr project's security page.