blktrace (aka Block IO Tracing) is vulnerable to buffer overflow attacks. This exists in the dev_map_read function
in btt/devmap.c
because the device and devno arrays are too small, as demonstrated by an invalid free when using the btt program with a crafted file. This may leads to a application crash.
CPE | Name | Operator | Version |
---|---|---|---|
blktrace | eq | 1.0.5__8.el7 |
git.kernel.dk/?p=blktrace.git;a=log;h=d61ff409cb4dda31386373d706ea0cfb1aaac5b7
www.securityfocus.com/bid/104142
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.7_release_notes/index
access.redhat.com/errata/RHSA-2019:2162
access.redhat.com/security/updates/classification/#low
git.kernel.org/pub/scm/linux/kernel/git/axboe/blktrace.git/commit/?id=d61ff409cb4dda31386373d706ea0cfb1aaac5b7
www.spinics.net/lists/linux-btrace/msg00847.html