CVE-2020-29394

A buffer overflow in the dlt_filter_load function in dlt_common.c from dlt-daemon through 2.18.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in the format argument).
References
Link Resource
https://github.com/GENIVI/dlt-daemon/issues/274 Exploit Patch Third Party Advisory
https://github.com/GENIVI/dlt-daemon/pull/275 Patch Third Party Advisory
https://github.com/GENIVI/dlt-daemon/pull/288 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:genivi:diagnostic_log_and_trace:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-11-30 19:15

Updated : 2024-02-28 18:08


NVD link : CVE-2020-29394

Mitre link : CVE-2020-29394

CVE.ORG link : CVE-2020-29394


JSON object : View

Products Affected

debian

  • debian_linux

genivi

  • diagnostic_log_and_trace
CWE
CWE-787

Out-of-bounds Write