A buffer overflow in the dlt_filter_load function in dlt_common.c from dlt-daemon through 2.18.5 (GENIVI Diagnostic Log and Trace) allows arbitrary code execution because fscanf is misused (no limit on the number of characters to be read in the format argument).
References
Link Resource
https://github.com/GENIVI/dlt-daemon/issues/274 Exploit Patch Third Party Advisory
https://github.com/GENIVI/dlt-daemon/pull/275 Patch Third Party Advisory
https://github.com/GENIVI/dlt-daemon/pull/288 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html Mailing List Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-11-30T00:00:00

Updated: 2022-12-07T00:00:00

Reserved: 2020-11-30T00:00:00


Link: CVE-2020-29394

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-11-30T19:15:12.487

Modified: 2023-02-03T18:42:47.353


Link: CVE-2020-29394

JSON object: View

cve-icon Redhat Information

No data.

CWE