CVE-2026-45252
EUVD-2026-3125421.05.2026, 10:16
When a fusefs file system implements extended attributes, the kernel may send a FUSE_LISTXATTR message to the userspace daemon to retrieve the list of extended attributes for a given file. The FUSE protocol requires the daemon to return a packed list of NUL-terminated strings. The fusefs kernel module calls strlen() on this daemon-supplied buffer without first verifying that the entire list is NUL-terminated. If a malicious daemon sends a non-NUL-terminated list, the fusefs kernel module may read beyond the end of one heap-allocated buffer and potentially write beyond the end of a second buffer. A malicious daemon could disclose up to 253 bytes of kernel heap memory, or it could inject up to 250 attacker-controlled bytes into unallocated kernel heap space.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| freebsd | freebsd | 14.3 |
| freebsd | freebsd | 14.3:p1 |
| freebsd | freebsd | 14.3:p10 |
| freebsd | freebsd | 14.3:p11 |
| freebsd | freebsd | 14.3:p12 |
| freebsd | freebsd | 14.3:p13 |
| freebsd | freebsd | 14.3:p2 |
| freebsd | freebsd | 14.3:p3 |
| freebsd | freebsd | 14.3:p4 |
| freebsd | freebsd | 14.3:p5 |
| freebsd | freebsd | 14.3:p6 |
| freebsd | freebsd | 14.3:p7 |
| freebsd | freebsd | 14.3:p8 |
| freebsd | freebsd | 14.3:p9 |
| freebsd | freebsd | 14.4 |
| freebsd | freebsd | 14.4:p1 |
| freebsd | freebsd | 14.4:p2 |
| freebsd | freebsd | 14.4:p3 |
| freebsd | freebsd | 14.4:p4 |
| freebsd | freebsd | 14.4:rc1 |
| freebsd | freebsd | 15.0 |
| freebsd | freebsd | 15.0:p1 |
| freebsd | freebsd | 15.0:p2 |
| freebsd | freebsd | 15.0:p3 |
| freebsd | freebsd | 15.0:p4 |
| freebsd | freebsd | 15.0:p5 |
| freebsd | freebsd | 15.0:p6 |
| freebsd | freebsd | 15.0:p7 |
| freebsd | freebsd | 15.0:p8 |
𝑥
= Vulnerable software versions
Vulnerability Media Exposure