CVE-2026-45252 PUBLISHED

Heap overflow in FUSE_LISTXATTR

Assigner: freebsd
Reserved: 11.05.2026 Published: 21.05.2026 Updated: 21.05.2026

When a fusefs file system implements extended attributes, the kernel may send a FUSE_LISTXATTR message to the userspace daemon to retrieve the list of extended attributes for a given file. The FUSE protocol requires the daemon to return a packed list of NUL-terminated strings. The fusefs kernel module calls strlen() on this daemon-supplied buffer without first verifying that the entire list is NUL-terminated.

If a malicious daemon sends a non-NUL-terminated list, the fusefs kernel module may read beyond the end of one heap-allocated buffer and potentially write beyond the end of a second buffer. A malicious daemon could disclose up to 253 bytes of kernel heap memory, or it could inject up to 250 attacker-controlled bytes into unallocated kernel heap space.

Product Status

Vendor FreeBSD
Product FreeBSD
Versions Default: unknown
  • affected from 15.0-RELEASE to p9 (excl.)
  • affected from 14.4-RELEASE to p5 (excl.)
  • affected from 14.3-RELEASE to p14 (excl.)

Credits

  • Joshua Rogers of AISLE Research Team finder

References

Problem Types

  • CWE-122: Heap-based Buffer Overflow CWE