Description
In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get_seg_entry is not validated).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-9070 | In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can lead to slab-out-of-bounds read access in f2fs_build_segment_manager in fs/f2fs/segment.c, related to init_min_max_mtime in fs/f2fs/segment.c (because the second argument to get_seg_entry is not validated). |
Ubuntu USN |
USN-5120-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-5136-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5137-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5137-2 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5343-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:16:47.098Z
Reserved: 2019-11-29T00:00:00.000Z
Link: CVE-2019-19449
No data.
Status : Modified
Published: 2019-12-08T02:15:09.970
Modified: 2024-11-21T04:34:45.337
Link: CVE-2019-19449
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN