First published: Tue Mar 26 2024(Updated: )
In Eclipse ThreadX before version 6.4.0, the _Mtxinit() function in the Xtensa port was missing an array size check causing a memory overwrite. The affected file was ports/xtensa/xcc/src/tx_clib_lock.c
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse ThreadX | <6.4.0 | |
Eclipse ThreadX | <6.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2214 is considered to have a high severity due to the potential for memory overwrite leading to application instability.
To fix CVE-2024-2214, upgrade to Eclipse ThreadX version 6.4.0 or later where the vulnerability has been addressed.
CVE-2024-2214 affects Eclipse ThreadX versions prior to 6.4.0, particularly the Xtensa port implementation.
Exploiting CVE-2024-2214 could lead to memory corruption which may compromise system integrity and security.
There is no recommended workaround for CVE-2024-2214; the best practice is to update to the patched version.