Lucene search

K
archlinuxArch LinuxASA-201503-8
HistoryMar 12, 2015 - 12:00 a.m.

e2fsprogs: arbitrary code execution

2015-03-1200:00:00
Arch Linux
lists.archlinux.org
23

EPSS

0

Percentile

10.1%

If corrupted file system didn’t trip over some corruption check, and
then the file system was modified via tune2fs or debugfs, such that the
superblock was marked dirty and then written out via the closefs() path,
it’s possible that the buffer overrun could be triggered when the file
system is closed.
This issue can lead to arbitrary code execution if a malicious device is
plugged in and the mounting process chooses to run fsck (or other
application using the ext2fs library) on the device’s malicious filesystem.

OSVersionArchitecturePackageVersionFilename
anyanyanye2fsprogs< 1.42.12-2UNKNOWN