Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-19814

Опубликовано: 17 дек. 2019
Источник: debian
EPSS Низкий

Описание

In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxunfixedpackage
linuxno-dsabookwormpackage
linuxno-dsabullseyepackage
linuxno-dsabusterpackage
linuxignoredstretchpackage

EPSS

Процентиль: 76%
0.00971
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 6 лет назад

In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.

CVSS3: 7.3
redhat
около 6 лет назад

In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.

CVSS3: 7.8
nvd
около 6 лет назад

In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.

github
больше 3 лет назад

In the Linux kernel 5.0.21, mounting a crafted f2fs filesystem image can cause __remove_dirty_segment slab-out-of-bounds write access because an array is bounded by the number of dirty types (8) but the array index can exceed this.

CVSS3: 7.8
fstec
около 6 лет назад

Уязвимость функции __remove_dirty_segment ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 76%
0.00971
Низкий