CVE-2020-6108

7.8HIGH

An exploitable code execution vulnerability exists in the fsck_chk_orphan_node functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause a heap buffer overflow resultin

게시됨: 10/15/2020업데이트됨: 11/21/2024

설명

An exploitable code execution vulnerability exists in the fsck_chk_orphan_node functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause a heap buffer overflow resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.

AI 분석AI 기반

영향받는 제품

f2fs-tools_projectf2fs-tools

참조