Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-20427

Опубликовано: 27 янв. 2020
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 9
CVSS3: 9.8

Описание

In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic, and possibly remote code execution, due to the lack of validation for specific fields of packets sent by a client. Interaction between req_capsule_get_size and tgt_brw_write leads to a tgt_shortio2pages integer signedness error.

РелизСтатусПримечание
bionic

not-affected

no server code, see notes
devel

not-affected

code not present
eoan

not-affected

code not present
esm-infra-legacy/trusty

ignored

was needs-triage ESM criteria
esm-infra/bionic

not-affected

no server code, see notes
esm-infra/xenial

not-affected

no server code, see notes
precise/esm

ignored

end of life, was needs-triage
trusty

ignored

end of standard support
trusty/esm

ignored

end of ESM support, was ignored [was needs-triage ESM criteria]
upstream

not-affected

no server code, see notes

Показывать по

РелизСтатусПримечание
bionic

not-affected

no server code, see notes
devel

not-affected

code not present
eoan

not-affected

code not present
esm-infra-legacy/trusty

ignored

was needs-triage ESM criteria
esm-infra/bionic

not-affected

no server code, see notes
esm-infra/xenial

not-affected

no server code, see notes
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

ignored

end of ESM support, was ignored [was needs-triage ESM criteria]
upstream

not-affected

no server code, see notes

Показывать по

РелизСтатусПримечание
bionic

not-affected

no server code, see notes
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

no server code, see notes
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

no server code, see notes
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

not-affected

no server code, see notes

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

code not present
eoan

not-affected

code not present
esm-infra-legacy/trusty

ignored

was needs-triage ESM criteria
esm-infra/bionic

not-affected

code not present
esm-infra/xenial

not-affected

no server code, see notes
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

ignored

end of ESM support, was ignored [was needs-triage ESM criteria]
upstream

not-affected

no server code, see notes

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

code not present
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

ignored

superseded by linux-azure-5.3, was needs-triage
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

ignored

end of standard support, was needs-triage

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

code not present
eoan

not-affected

code not present
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

code not present
esm-infra/xenial

not-affected

no server code, see notes
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

code not present
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

ignored

end of kernel support, was needs-triage
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

no server code, see notes
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

no server code, see notes
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

no server code, see notes
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

no server code, see notes
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

no server code, see notes
esm-infra/xenial

not-affected

no server code, see notes
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

ignored

superseded by linux-hwe-5.4, was needs-triage
esm-infra/xenial

ignored

superseded by linux-hwe, was needs-triage
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes

Показывать по

РелизСтатусПримечание
bionic

not-affected

no server code, see notes
devel

not-affected

code not present
eoan

not-affected

code not present
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

no server code, see notes
esm-infra/xenial

not-affected

no server code, see notes
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

ignored

end of life, was needs-triage
trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

ignored

was needs-triage ESM criteria
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

ignored

end of ESM support, was ignored [was needs-triage ESM criteria]
upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

no server code, see notes
devel

DNE

eoan

not-affected

no server code, see notes
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

no server code, see notes
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

ignored

end of standard support, was needs-triage

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

code not present
eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

DNE

eoan

not-affected

code not present
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

no server code, see notes
devel

not-affected

code not present
eoan

not-affected

code not present
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

no server code, see notes
esm-infra/xenial

not-affected

no server code, see notes
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

code not present
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

no server code, see notes
devel

not-affected

code not present
eoan

not-affected

code not present
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

not-affected

no server code, see notes

Показывать по

РелизСтатусПримечание
bionic

not-affected

code not present
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

DNE

Показывать по

РелизСтатусПримечание
bionic

not-affected

no server code, see notes
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

no server code, see notes
xenial

not-affected

no server code, see notes

Показывать по

EPSS

Процентиль: 88%
0.03698
Низкий

9 Critical

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 6 лет назад

In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic, and possibly remote code execution, due to the lack of validation for specific fields of packets sent by a client. Interaction between req_capsule_get_size and tgt_brw_write leads to a tgt_shortio2pages integer signedness error.

CVSS3: 9.8
debian
около 6 лет назад

In the Lustre file system before 2.12.3, the ptlrpc module has a buffe ...

github
больше 3 лет назад

In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic, and possibly remote code execution, due to the lack of validation for specific fields of packets sent by a client. Interaction between req_capsule_get_size and tgt_brw_write leads to a tgt_shortio2pages integer signedness error.

EPSS

Процентиль: 88%
0.03698
Низкий

9 Critical

CVSS2

9.8 Critical

CVSS3

Уязвимость CVE-2019-20427