{"id":"CVE-2020-10232","details":"In version 4.8.0 and earlier of The Sleuth Kit (TSK), there is a stack buffer overflow vulnerability in the YAFFS file timestamp parsing logic in yaffsfs_istat() in fs/yaffs.c.","modified":"2026-04-11T15:27:39.172239Z","published":"2020-03-09T00:15:10.830Z","related":["MGASA-2020-0143"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5EY53OYU7UZLAJWNIVVNR3EX2RNCCFTB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQR2QY3IAF2IG6HGBSKGL66VUDOTC3OA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFQKIE5U3LS5U7POPGS7YHLUSW2URWGJ/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00011.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/06/msg00015.html"},{"type":"FIX","url":"https://github.com/sleuthkit/sleuthkit/commit/459ae818fc8dae717549810150de4d191ce158f1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sleuthkit/sleuthkit","events":[{"introduced":"0"},{"last_affected":"25405809cbc7a72741d59d70193907f9afac3824"},{"fixed":"459ae818fc8dae717549810150de4d191ce158f1"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.8.0"}]}}],"versions":["sleuthkit-4.0.2","sleuthkit-4.6.3","sleuthkit-4.8.0","sleuthkit-4.8.0-fixed"],"database_specific":{"vanir_signatures":[{"signature_type":"Function","signature_version":"v1","target":{"function":"yaffsfs_istat","file":"tsk/fs/yaffs.cpp"},"source":"https://github.com/sleuthkit/sleuthkit/commit/459ae818fc8dae717549810150de4d191ce158f1","digest":{"length":2898,"function_hash":"263724667031508014577914061865834071996"},"deprecated":false,"id":"CVE-2020-10232-7d89f174"},{"signature_type":"Line","signature_version":"v1","target":{"file":"tsk/fs/yaffs.cpp"},"source":"https://github.com/sleuthkit/sleuthkit/commit/459ae818fc8dae717549810150de4d191ce158f1","digest":{"line_hashes":["229477867235996326580794300073845982637","315498531788442505570037119712918689127","71916475094926165661512058954710082462","260045061982410582454978425116972741467"],"threshold":0.9},"deprecated":false,"id":"CVE-2020-10232-e06d7a8c"}],"vanir_signatures_modified":"2026-04-11T15:27:39Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-10232.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}