Filtered by vendor Lustre
Subscriptions
Total
11 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-20432 | 1 Lustre | 1 Lustre | 2024-11-21 | 7.5 High |
In the Lustre file system before 2.12.3, the mdt module has an out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. mdt_file_secctx_unpack does not validate the value of name_size derived from req_capsule_get_size. | ||||
CVE-2019-20431 | 1 Lustre | 1 Lustre | 2024-11-21 | 7.5 High |
In the Lustre file system before 2.12.3, the ptlrpc module has an osd_map_remote_to_local out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. osd_bufs_get in the osd_ldiskfs module does not validate a certain length value. | ||||
CVE-2019-20430 | 1 Lustre | 1 Lustre | 2024-11-21 | 7.5 High |
In the Lustre file system before 2.12.3, the mdt module has an LBUG panic (via a large MDT Body eadatasize field) due to the lack of validation for specific fields of packets sent by a client. | ||||
CVE-2019-20429 | 1 Lustre | 1 Lustre | 2024-11-21 | 7.5 High |
In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds read and panic (via a modified lm_bufcount field) due to the lack of validation for specific fields of packets sent by a client. This is caused by interaction between sptlrpc_svc_unwrap_request and lustre_msg_hdr_size_v2. | ||||
CVE-2019-20428 | 1 Lustre | 1 Lustre | 2024-11-21 | 7.5 High |
In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds read and panic due to the lack of validation for specific fields of packets sent by a client. The ldl_request_cancel function mishandles a large lock_count parameter. | ||||
CVE-2019-20427 | 1 Lustre | 1 Lustre | 2024-11-21 | 9.8 Critical |
In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic, and possibly remote code execution, due to the lack of validation for specific fields of packets sent by a client. Interaction between req_capsule_get_size and tgt_brw_write leads to a tgt_shortio2pages integer signedness error. | ||||
CVE-2019-20426 | 1 Lustre | 1 Lustre | 2024-11-21 | 7.5 High |
In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. In the function ldlm_cancel_hpreq_check, there is no lock_count bounds check. | ||||
CVE-2019-20425 | 1 Lustre | 1 Lustre | 2024-11-21 | 7.5 High |
In the Lustre file system before 2.12.3, the ptlrpc module has an out-of-bounds access and panic due to the lack of validation for specific fields of packets sent by a client. In the function lustre_msg_string, there is no validation of a certain length value derived from lustre_msg_buflen_v2. | ||||
CVE-2019-20424 | 1 Lustre | 1 Lustre | 2024-11-21 | 7.5 High |
In the Lustre file system before 2.12.3, mdt_object_remote in the mdt module has a NULL pointer dereference and panic due to the lack of validation for specific fields of packets sent by a client. | ||||
CVE-2019-20423 | 1 Lustre | 1 Lustre | 2024-11-21 | 7.5 High |
In the Lustre file system before 2.12.3, the ptlrpc module has a buffer overflow and panic due to the lack of validation for specific fields of packets sent by a client. The function target_handle_connect() mishandles a certain size value when a client connects to a server, because of an integer signedness error. | ||||
CVE-2008-4970 | 1 Lustre | 1 Lustre-tests | 2024-11-21 | N/A |
runiozone in lustre 1.6.5 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/iozone.log temporary file. |
Page 1 of 1.