Vigil@nce - Linux kernel: buffer overflow via __btrfs_map_block, analyzed on 03/07/2020

Vigil@nce - Linux kernel: buffer overflow via __btrfs_map_block, analyzed on 03/07/2020

The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.







Synthesis of the vulnerability 


An attacker can trigger a buffer overflow via __btrfs_map_block() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.Vulnerable products: Linux, SUSE Linux Enterprise Desktop, SLES, Ubuntu.Severity of this weakness: 2/4.Creation date: 03/07/2020.Références of this bulletin: CERTFR-2020-AVI-124, CERTFR-2020-AVI-130, CERTFR-2020-AVI-148, CERTFR-2020-AVI-421, CVE-2019-19816, SUSE-SU-2020:0559-1, SUSE-SU-2020:0580-1, SUSE-SU-2020:0605-1, USN-4414-1, VIGILANCE-VUL-32700.

Description of the vulnerability 


An attacker can trigger a buffer overflow via __btrfs_map_block() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer vulnerability impacts software or systems such as Linux, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Ou ..

Support the originator by clicking the read the rest link below.