{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2024-8946","title":"Title"},{"category":"description","text":"A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affected is the function mp_vfs_umount of the file extmod/vfs.c of the component VFS Unmount Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 29943546343c92334e8518695a11fc0e2ceea68b. It is recommended to apply a patch to fix this issue. In the VFS unmount process, the comparison between the mounted path string and the unmount requested string is based solely on the length of the unmount string, which can lead to a heap buffer overflow read.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2024-8946","url":"https://www.suse.com/security/cve/CVE-2024-8946"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1230675 for CVE-2024-8946","url":"https://bugzilla.suse.com/1230675"}],"title":"SUSE CVE CVE-2024-8946","tracking":{"current_release_date":"2025-12-19T01:11:24Z","generator":{"date":"2024-09-19T03:24:04Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2024-8946","initial_release_date":"2024-09-19T03:24:04Z","revision_history":[{"date":"2024-09-19T03:24:04Z","number":"2","summary":"Current version"},{"date":"2025-01-01T01:35:25Z","number":"3","summary":"Current version"},{"date":"2025-02-14T05:37:33Z","number":"4","summary":"Current version"},{"date":"2025-02-16T05:28:55Z","number":"5","summary":"Current version"},{"date":"2025-12-17T01:02:51Z","number":"6","summary":"description changed"},{"date":"2025-12-19T01:11:24Z","number":"7","summary":"description changed"}],"status":"interim","version":"7"}}}