Описание
A stack buffer overflow vulnerability exists in the buffer_get function of duc, a disk management tool, where a condition can evaluate to true due to underflow, allowing an out-of-bounds read.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| duc | fixed | 1.4.6-1 | package |
Примечания
Fixed by: https://github.com/zevv/duc/commit/8638c4365ffd9e1966bdef8af6339dbee8c17e66 (1.4.6)
https://hackingbydoing.wixsite.com/hackingbydoing/post/stack-buffer-overflow-in-duc
Crash in CLI tool, no security impact
Связанные уязвимости
A stack buffer overflow vulnerability exists in the buffer_get function of duc, a disk management tool, where a condition can evaluate to true due to underflow, allowing an out-of-bounds read.
A stack buffer overflow vulnerability exists in the buffer_get function of duc, a disk management tool, where a condition can evaluate to true due to underflow, allowing an out-of-bounds read.
A stack buffer overflow vulnerability exists in the buffer_get function of duc, a disk management tool, where a condition can evaluate to true due to underflow, allowing an out-of-bounds read.