CVE-2018-10689

blktrace (aka Block IO Tracing) 1.2.0, as used with the Linux kernel and Android, has a buffer overflow in the dev_map_read function in btt/devmap.c because the device and devno arrays are too small, as demonstrated by an invalid free when using the btt program with a crafted file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:blktrace_project:blktrace:1.2.0:*:*:*:*:android:*:*
cpe:2.3:a:blktrace_project:blktrace:1.2.0:*:*:*:*:linux:*:*

History

21 Nov 2024, 03:41

Type Values Removed Values Added
References () http://git.kernel.dk/?p=blktrace.git%3Ba=log%3Bh=d61ff409cb4dda31386373d706ea0cfb1aaac5b7 - () http://git.kernel.dk/?p=blktrace.git%3Ba=log%3Bh=d61ff409cb4dda31386373d706ea0cfb1aaac5b7 -
References () http://www.securityfocus.com/bid/104142 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/104142 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2019:2162 - () https://access.redhat.com/errata/RHSA-2019:2162 -
References () https://git.kernel.org/pub/scm/linux/kernel/git/axboe/blktrace.git/commit/?id=d61ff409cb4dda31386373d706ea0cfb1aaac5b7 - Patch () https://git.kernel.org/pub/scm/linux/kernel/git/axboe/blktrace.git/commit/?id=d61ff409cb4dda31386373d706ea0cfb1aaac5b7 - Patch
References () https://security.gentoo.org/glsa/202107-15 - () https://security.gentoo.org/glsa/202107-15 -
References () https://www.spinics.net/lists/linux-btrace/msg00847.html - Mailing List, Third Party Advisory () https://www.spinics.net/lists/linux-btrace/msg00847.html - Mailing List, Third Party Advisory

Information

Published : 2018-05-03 07:29

Updated : 2024-11-21 03:41


NVD link : CVE-2018-10689

Mitre link : CVE-2018-10689

CVE.ORG link : CVE-2018-10689


JSON object : View

Products Affected

blktrace_project

  • blktrace
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer