An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.debian.org/security/2019/dsa-4535 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html | third party advisory mailing list |
https://seclists.org/bugtraq/2019/Sep/58 | third party advisory mailing list |
https://usn.ubuntu.com/4142-2/ | third party advisory vendor advisory |
https://usn.ubuntu.com/4142-1/ | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/ | vendor advisory |
https://security.gentoo.org/glsa/202003-05 | third party advisory vendor advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887 | third party advisory exploit |
https://security.netapp.com/advisory/ntap-20200115-0002/ | third party advisory |