blktrace (aka Block IO Tracing) 1.2.0, as used with the Linux kernel and Android, has a buffer overflow in the dev_map_read function in btt/devmap.c because the device and devno arrays are too small, as demonstrated by an invalid free when using the btt program with a crafted file.
References
Link | Resource |
---|---|
https://www.spinics.net/lists/linux-btrace/msg00847.html | Mailing List Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/axboe/blktrace.git/commit/?id=d61ff409cb4dda31386373d706ea0cfb1aaac5b7 | Patch |
http://git.kernel.dk/?p=blktrace.git;a=log;h=d61ff409cb4dda31386373d706ea0cfb1aaac5b7 | Issue Tracking Third Party Advisory |
http://www.securityfocus.com/bid/104142 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2019:2162 | |
https://security.gentoo.org/glsa/202107-15 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-05-03 00:29
Updated : 2021-07-08 00:15
NVD link : CVE-2018-10689
Mitre link : CVE-2018-10689
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
blktrace_project
- blktrace