First published: Fri Oct 04 2024(Updated: )
No proper validation of the length of user input in olcp_ind_handler in zephyr/subsys/bluetooth/services/ots/ots_client.c.
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyr Project Manager | <=3.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6444 is classified as a medium severity vulnerability due to improper validation of user input.
To fix CVE-2024-6444, update to a fixed version of Zephyr Project software beyond version 3.6.0.
CVE-2024-6444 affects Zephyr Project software versions up to and including 3.6.0.
CVE-2024-6444 means that users of Zephyr Project should conduct an immediate review and update of their systems to mitigate potential input validation issues.
As of now, there are no publicly disclosed exploits directly related to CVE-2024-6444 reported.