CVE-2020-6108

7.8HIGH

An exploitable code execution vulnerability exists in the fsck_chk_orphan_node functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause a heap buffer overflow resultin

Veröffentlicht: 10/15/2020Aktualisiert: 11/21/2024

Beschreibung

An exploitable code execution vulnerability exists in the fsck_chk_orphan_node functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause a heap buffer overflow resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.

KI-AnalyseKI-gestützt

Betroffene Produkte

f2fs-tools_projectf2fs-tools

Referenzen