CVE-2015-1572

Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0247.
References
Link Resource
http://advisories.mageia.org/MGASA-2015-0088.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.mandriva.com/security/advisories?name=MDVSA-2015:068
http://www.securityfocus.com/bid/72709
http://www.ubuntu.com/usn/USN-2507-1
https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73 Vendor Advisory
https://security.gentoo.org/glsa/201507-22
http://advisories.mageia.org/MGASA-2015-0088.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html
http://www.debian.org/security/2015/dsa-3166
http://www.mandriva.com/security/advisories?name=MDVSA-2015:067
http://www.mandriva.com/security/advisories?name=MDVSA-2015:068
http://www.securityfocus.com/bid/72709
http://www.ubuntu.com/usn/USN-2507-1
https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73 Vendor Advisory
https://security.gentoo.org/glsa/201507-22
Configurations

Configuration 1 (hide)

cpe:2.3:a:e2fsprogs_project:e2fsprogs:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*

History

21 Nov 2024, 02:25

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2015-0088.html - () http://advisories.mageia.org/MGASA-2015-0088.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html - () http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html -
References () http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html - () http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html -
References () http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html - () http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html -
References () http://www.debian.org/security/2015/dsa-3166 - () http://www.debian.org/security/2015/dsa-3166 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:067 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:067 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:068 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:068 -
References () http://www.securityfocus.com/bid/72709 - () http://www.securityfocus.com/bid/72709 -
References () http://www.ubuntu.com/usn/USN-2507-1 - () http://www.ubuntu.com/usn/USN-2507-1 -
References () https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73 - Vendor Advisory () https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73 - Vendor Advisory
References () https://security.gentoo.org/glsa/201507-22 - () https://security.gentoo.org/glsa/201507-22 -

Information

Published : 2015-02-24 15:59

Updated : 2024-11-21 02:25


NVD link : CVE-2015-1572

Mitre link : CVE-2015-1572

CVE.ORG link : CVE-2015-1572


JSON object : View

Products Affected

debian

  • debian_linux

canonical

  • ubuntu_linux

e2fsprogs_project

  • e2fsprogs
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer