A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/ | vendor advisory |
https://usn.ubuntu.com/4249-1/ | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/ | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html | vendor advisory mailing list third party advisory |
https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html | third party advisory mailing list |
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973 | third party advisory exploit |
https://security.netapp.com/advisory/ntap-20220506-0001/ | third party advisory |