CVE-2020-6108
7.8HIGHAn exploitable code execution vulnerability exists in the fsck_chk_orphan_node functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause a heap buffer overflow resultin
Veröffentlicht: 10/15/2020Aktualisiert: 11/21/2024
Beschreibung
An exploitable code execution vulnerability exists in the fsck_chk_orphan_node functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause a heap buffer overflow resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.
KI-AnalyseKI-gestützt
Betroffene Produkte
f2fs-tools_projectf2fs-tools
Referenzen
- https://security.gentoo.org/glsa/202101-26Third Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1050ExploitTechnical DescriptionThird Party Advisory
- https://security.gentoo.org/glsa/202101-26Third Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-1050ExploitTechnical DescriptionThird Party Advisory