blktrace (aka Block IO Tracing) 1.2.0, as used with the Linux kernel and Android, has a buffer overflow in the dev_map_read function in btt/devmap.c because the device and devno arrays are too small, as demonstrated by an invalid free when using the btt program with a crafted file.
References
| Link | Resource |
|---|---|
| https://www.spinics.net/lists/linux-btrace/msg00847.html | Mailing List Third Party Advisory |
| https://git.kernel.org/pub/scm/linux/kernel/git/axboe/blktrace.git/commit/?id=d61ff409cb4dda31386373d706ea0cfb1aaac5b7 | Patch |
| http://git.kernel.dk/?p=blktrace.git;a=log;h=d61ff409cb4dda31386373d706ea0cfb1aaac5b7 | Issue Tracking Third Party Advisory |
| http://www.securityfocus.com/bid/104142 | Third Party Advisory VDB Entry |
| https://access.redhat.com/errata/RHSA-2019:2162 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-05-03 07:29
Updated : 2021-07-08 07:15
NVD link : CVE-2018-10689
Mitre link : CVE-2018-10689
JSON object : View
Products Affected
blktrace_project
- blktrace
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
