CVE-2015-0247

Heap-based buffer overflow in openfs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code via crafted block group descriptor data in a filesystem image.
References
Link Resource
http://advisories.mageia.org/MGASA-2015-0061.html
http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:045
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.ocert.org/advisories/ocert-2015-002.html US Government Resource
http://www.securityfocus.com/archive/1/534633/100/0/threaded
http://www.securityfocus.com/bid/72520
http://www.ubuntu.com/usn/USN-2507-1
https://bugzilla.redhat.com/show_bug.cgi?id=1187032
https://exchange.xforce.ibmcloud.com/vulnerabilities/100740
https://security.gentoo.org/glsa/201701-06
http://advisories.mageia.org/MGASA-2015-0061.html
http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:045
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.ocert.org/advisories/ocert-2015-002.html US Government Resource
http://www.securityfocus.com/archive/1/534633/100/0/threaded
http://www.securityfocus.com/bid/72520
http://www.ubuntu.com/usn/USN-2507-1
https://bugzilla.redhat.com/show_bug.cgi?id=1187032
https://exchange.xforce.ibmcloud.com/vulnerabilities/100740
https://security.gentoo.org/glsa/201701-06
Configurations

Configuration 1 (hide)

cpe:2.3:a:e2fsprogs_project:e2fsprogs:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*

History

21 Nov 2024, 02:22

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2015-0061.html - () http://advisories.mageia.org/MGASA-2015-0061.html -
References () http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4 - () http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4 -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html - () http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html -
References () http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html - () http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html -
References () http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html - () http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html -
References () http://www.debian.org/security/2015/dsa-3166 - () http://www.debian.org/security/2015/dsa-3166 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:045 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:045 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:067 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:067 -
References () http://www.ocert.org/advisories/ocert-2015-002.html - US Government Resource () http://www.ocert.org/advisories/ocert-2015-002.html - US Government Resource
References () http://www.securityfocus.com/archive/1/534633/100/0/threaded - () http://www.securityfocus.com/archive/1/534633/100/0/threaded -
References () http://www.securityfocus.com/bid/72520 - () http://www.securityfocus.com/bid/72520 -
References () http://www.ubuntu.com/usn/USN-2507-1 - () http://www.ubuntu.com/usn/USN-2507-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1187032 - () https://bugzilla.redhat.com/show_bug.cgi?id=1187032 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/100740 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/100740 -
References () https://security.gentoo.org/glsa/201701-06 - () https://security.gentoo.org/glsa/201701-06 -

Information

Published : 2015-02-17 15:59

Updated : 2024-11-21 02:22


NVD link : CVE-2015-0247

Mitre link : CVE-2015-0247

CVE.ORG link : CVE-2015-0247


JSON object : View

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

fedoraproject

  • fedora

e2fsprogs_project

  • e2fsprogs
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer