The daemon in GENIVI diagnostic log and trace (DLT), is vulnerable to a heap-based buffer overflow that could allow an attacker to remotely execute arbitrary code on the DLT-Daemon (versions prior to 2.18.6).
References
Link | Resource |
---|---|
https://github.com/GENIVI/dlt-daemon/compare/v2.18.5...v2.18.6 | Patch Third Party Advisory |
https://github.com/GENIVI/dlt-daemon/issues/265 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html | Patch Third Party Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-147-01 | Third Party Advisory US Government Resource |
https://github.com/GENIVI/dlt-daemon/compare/v2.18.5...v2.18.6 | Patch Third Party Advisory |
https://github.com/GENIVI/dlt-daemon/issues/265 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html | Patch Third Party Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-147-01 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 05:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/GENIVI/dlt-daemon/compare/v2.18.5...v2.18.6 - Patch, Third Party Advisory | |
References | () https://github.com/GENIVI/dlt-daemon/issues/265 - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html - Patch, Third Party Advisory | |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-147-01 - Third Party Advisory, US Government Resource |
Information
Published : 2021-02-10 07:15
Updated : 2024-11-21 05:29
NVD link : CVE-2020-36244
Mitre link : CVE-2020-36244
CVE.ORG link : CVE-2020-36244
JSON object : View
Products Affected
genivi
- diagnostic_log_and_trace
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write