In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get_seg_entry is not validated).
References
Link | Resource |
---|---|
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449 | Exploit Third Party Advisory |
https://security.netapp.com/advisory/ntap-20200103-0001/ | |
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449 | Exploit Third Party Advisory |
https://security.netapp.com/advisory/ntap-20200103-0001/ |
Configurations
History
21 Nov 2024, 04:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449 - Exploit, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20200103-0001/ - |
Information
Published : 2019-12-08 02:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19449
Mitre link : CVE-2019-19449
CVE.ORG link : CVE-2019-19449
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read