Azure RTOS FileX is a FAT-compatible file system that’s fully integrated with Azure RTOS ThreadX. In versions before 6.2.0, the Fault Tolerant feature of Azure RTOS FileX includes integer under and overflows which may be exploited to achieve buffer overflow and modify memory contents. When a valid log file with correct ID and checksum is detected by the `_fx_fault_tolerant_enable` function an attempt to recover the previous failed write operation is taken by call of `_fx_fault_tolerant_apply_logs`. This function iterates through the log entries and performs required recovery operations. When properly crafted a log including entries of type `FX_FAULT_TOLERANT_DIR_LOG_TYPE` may be utilized to introduce unexpected behavior. This issue has been patched in version 6.2.0. A workaround to fix line 218 in fx_fault_tolerant_apply_logs.c is documented in the GHSA.
References
Link | Resource |
---|---|
https://github.com/azure-rtos/filex/blob/master/common/src/fx_fault_tolerant_apply_logs.c#L218 | Patch Third Party Advisory |
https://github.com/azure-rtos/filex/security/advisories/GHSA-8jqf-wjhq-4w9f | Exploit Mitigation Third Party Advisory |
https://github.com/azure-rtos/filex/blob/master/common/src/fx_fault_tolerant_apply_logs.c#L218 | Patch Third Party Advisory |
https://github.com/azure-rtos/filex/security/advisories/GHSA-8jqf-wjhq-4w9f | Exploit Mitigation Third Party Advisory |
Configurations
History
21 Nov 2024, 07:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.6 |
References | () https://github.com/azure-rtos/filex/blob/master/common/src/fx_fault_tolerant_apply_logs.c#L218 - Patch, Third Party Advisory | |
References | () https://github.com/azure-rtos/filex/security/advisories/GHSA-8jqf-wjhq-4w9f - Exploit, Mitigation, Third Party Advisory |
07 Nov 2023, 03:50
Type | Values Removed | Values Added |
---|---|---|
Summary | Azure RTOS FileX is a FAT-compatible file system that’s fully integrated with Azure RTOS ThreadX. In versions before 6.2.0, the Fault Tolerant feature of Azure RTOS FileX includes integer under and overflows which may be exploited to achieve buffer overflow and modify memory contents. When a valid log file with correct ID and checksum is detected by the `_fx_fault_tolerant_enable` function an attempt to recover the previous failed write operation is taken by call of `_fx_fault_tolerant_apply_logs`. This function iterates through the log entries and performs required recovery operations. When properly crafted a log including entries of type `FX_FAULT_TOLERANT_DIR_LOG_TYPE` may be utilized to introduce unexpected behavior. This issue has been patched in version 6.2.0. A workaround to fix line 218 in fx_fault_tolerant_apply_logs.c is documented in the GHSA. |
Information
Published : 2022-11-08 08:15
Updated : 2024-11-21 07:18
NVD link : CVE-2022-39343
Mitre link : CVE-2022-39343
CVE.ORG link : CVE-2022-39343
JSON object : View
Products Affected
microsoft
- azure_rtos_filex