CVE-2024-2214

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-2214
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-2214.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-2214
Related
  • GHSA-vmp6-qhp9-r66x
Published
2024-03-26T16:15:13Z
Modified
2025-10-16T06:05:18.957065Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In Eclipse ThreadX before version 6.4.0, the Mtxinit() function in the Xtensa port was missing an array size check causing a memory overwrite. The affected file was ports/xtensa/xcc/src/txclib_lock.c

References

Affected packages

Git / github.com/eclipse-threadx/threadx

Affected ranges

Type
GIT
Repo
https://github.com/eclipse-threadx/threadx
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v6.*

v6.0.1_rel
v6.0.2_rel
v6.0_rel
v6.1.10_rel
v6.1.11_rel
v6.1.12_rel
v6.1.1_rel
v6.1.2_rel
v6.1.3_rel
v6.1.5_rel
v6.1.6_rel
v6.1.7_rel
v6.1.8_rel
v6.1.9_rel
v6.1_rel
v6.2.0_rel
v6.2.1_rel
v6.3.0_rel

Database specific

{
    "vanir_signatures": [
        {
            "signature_version": "v1",
            "target": {
                "function": "_Mtxinit",
                "file": "ports/xtensa/xcc/src/tx_clib_lock.c"
            },
            "signature_type": "Function",
            "source": "https://github.com/eclipse-threadx/threadx/commit/39f3c86c61ec478720bac9fca8f17ccedb8f052b",
            "deprecated": false,
            "digest": {
                "length": 272.0,
                "function_hash": "21440705155404283821141681700921315961"
            },
            "id": "CVE-2024-2214-1936b16f"
        },
        {
            "signature_version": "v1",
            "target": {
                "file": "ports/xtensa/xcc/src/tx_clib_lock.c"
            },
            "signature_type": "Line",
            "source": "https://github.com/eclipse-threadx/threadx/commit/39f3c86c61ec478720bac9fca8f17ccedb8f052b",
            "deprecated": false,
            "digest": {
                "line_hashes": [
                    "321615530020277052163727575189001966430",
                    "76076730028992049536459261922763312508",
                    "161729058754765427883402847621987807659",
                    "248756517319654798557447821379620083935"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2024-2214-fa92f5c0"
        }
    ]
}