An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
Name | Vendor | Start Version | End Version |
---|---|---|---|
F2fs-tools | F2fs-tools_project | * | 1.14.0 (excluding) |
F2fs-tools | Ubuntu | bionic | * |
F2fs-tools | Ubuntu | groovy | * |
F2fs-tools | Ubuntu | hirsute | * |
F2fs-tools | Ubuntu | impish | * |
F2fs-tools | Ubuntu | kinetic | * |
F2fs-tools | Ubuntu | lunar | * |
F2fs-tools | Ubuntu | mantic | * |
F2fs-tools | Ubuntu | trusty | * |
F2fs-tools | Ubuntu | xenial | * |