Possible buffer overflow in is_mount_point
References
Link | Resource |
---|---|
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-mh67-4h3q-p437 | Exploit Patch Vendor Advisory |
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-mh67-4h3q-p437 | Exploit Patch Vendor Advisory |
Configurations
History
23 Jan 2025, 17:36
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:* | |
References | () https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-mh67-4h3q-p437 - Exploit, Patch, Vendor Advisory | |
First Time |
Zephyrproject zephyr
Zephyrproject |
21 Nov 2024, 08:44
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-mh67-4h3q-p437 - |
29 Feb 2024, 01:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-29 01:42
Updated : 2025-01-23 17:36
NVD link : CVE-2023-6881
Mitre link : CVE-2023-6881
CVE.ORG link : CVE-2023-6881
JSON object : View
Products Affected
zephyrproject
- zephyr
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')