UDisks 2.8.0 has a format string vulnerability in udisks_log in udiskslogging.c, allowing attackers to obtain sensitive information (stack contents), cause a denial of service (memory corruption), or possibly have unspecified other impact via a malformed filesystem label, as demonstrated by %d or %n substrings.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:2178 | |
https://github.com/storaged-project/udisks/issues/578 | Exploit Patch Third Party Advisory |
https://usn.ubuntu.com/3772-1/ | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:2178 | |
https://github.com/storaged-project/udisks/issues/578 | Exploit Patch Third Party Advisory |
https://usn.ubuntu.com/3772-1/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2019:2178 - | |
References | () https://github.com/storaged-project/udisks/issues/578 - Exploit, Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/3772-1/ - Third Party Advisory |
Information
Published : 2018-09-22 16:29
Updated : 2024-11-21 03:54
NVD link : CVE-2018-17336
Mitre link : CVE-2018-17336
CVE.ORG link : CVE-2018-17336
JSON object : View
Products Affected
canonical
- ubuntu_linux
freedesktop
- udisks
CWE
CWE-134
Use of Externally-Controlled Format String