An issue in dlt_config_file_parser.c of dlt-daemon v2.18.8 allows attackers to cause a double free via crafted TCP packets.
The product calls free() twice on the same memory address.
Link | Tags |
---|---|
https://github.com/COVESA/dlt-daemon/pull/376/commits | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html | third party advisory mailing list |