Skip to content

fs: fuse: buffer overflow vulnerability in the Zephyr FS

High
ceolin published GHSA-mh67-4h3q-p437 Feb 20, 2024

Package

zephyr (zephyr)

Affected versions

<= 3.5

Patched versions

None

Description

Summary

Possible buffer overflow in is_mount_point:
https://github.com/zephyrproject-rtos/zephyr/blob/main/subsys/fs/fuse_fs_access.c#L69

Details

If the string passed via path parameter is PATH_MAX long, sprintf will overflow dir_path by one byte.

static bool is_mount_point(const char *path)
{
    char dir_path[PATH_MAX];

    sprintf(dir_path, "%s", path);
    return strcmp(dirname(dir_path), "/") == 0;
}

Patches

main: #66592

embargo: 2024-02-20

For more information

If you have any questions or comments about this advisory:

Severity

High
7.3
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

CVE ID

CVE-2023-6881

Weaknesses

Credits