In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get_seg_entry is not validated).
References
Link | Resource |
---|---|
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449 | Exploit Third Party Advisory |
https://security.netapp.com/advisory/ntap-20200103-0001/ | |
https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19449 | Exploit Third Party Advisory |
https://security.netapp.com/advisory/ntap-20200103-0001/ |
Configurations
History
No history.
Information
Published : 2019-12-08 02:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19449
Mitre link : CVE-2019-19449
CVE.ORG link : CVE-2019-19449
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read