blktrace (aka Block IO Tracing) 1.2.0, as used with the Linux kernel and Android, has a buffer overflow in the dev_map_read function in btt/devmap.c because the device and devno arrays are too small, as demonstrated by an invalid free when using the btt program with a crafted file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.dk/?p=blktrace.git%3Ba=log%3Bh=d61ff409cb4dda31386373d706ea0cfb1aaac5b7 - | |
References | () http://www.securityfocus.com/bid/104142 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2019:2162 - | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/axboe/blktrace.git/commit/?id=d61ff409cb4dda31386373d706ea0cfb1aaac5b7 - Patch | |
References | () https://security.gentoo.org/glsa/202107-15 - | |
References | () https://www.spinics.net/lists/linux-btrace/msg00847.html - Mailing List, Third Party Advisory |
07 Nov 2023, 02:51
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-05-03 07:29
Updated : 2024-11-21 03:41
NVD link : CVE-2018-10689
Mitre link : CVE-2018-10689
CVE.ORG link : CVE-2018-10689
JSON object : View
Products Affected
blktrace_project
- blktrace
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer