CVE-2019-5094: malicious fs can cause buffer overrun in e2fsck

Related Vulnerabilities: CVE-2019-5094  

Debian Bug report logs - #941139
CVE-2019-5094: malicious fs can cause buffer overrun in e2fsck

version graph

Reported by: "Theodore Y. Ts'o" <tytso@mit.edu>

Date: Wed, 25 Sep 2019 15:42:01 UTC

Severity: grave

Tags: fixed-upstream, security, upstream

Found in versions e2fsprogs/1.44.5-1, e2fsprogs/1.43.4-2, e2fsprogs/1.44.5-1+deb10u1

Fixed in version e2fsprogs/1.45.4-1

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, unknown-package@qa.debian.org:
Bug#941139; Package debian. (Wed, 25 Sep 2019 15:42:04 GMT) (full text, mbox, link).


Acknowledgement sent to "Theodore Y. Ts'o" <tytso@mit.edu>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, unknown-package@qa.debian.org. (Wed, 25 Sep 2019 15:42:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: "Theodore Y. Ts'o" <tytso@mit.edu>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: CVE-2019-5094: malicious fs can cause buffer overrun in e2fsck
Date: Wed, 25 Sep 2019 11:39:04 -0400
Package: debian
Version: 1.44.5-1+deb10u1
Severity: grave
Tags: security
Justification: user security hole

E2fsprogs 1.45.4 contains a bugfix for CVE-2019-5094 / TALOS-2019-0887.
We need to backport commit 8dbe7b475ec5: "libsupport: add checks to
prevent buffer overrun bugs in quota code" to the versions of e2fsprogs
found in Debian Buster and Stretch.

The impact of this bug is that if an attacker can tricker the system
into running e2fsck on an untrustworthy file system as root, a
maliciously crafted file system could result in a buffer overflow that
can result in arbitrary userspace memory modification.

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (900, 'testing'), (900, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 5.3.0-00068-g7ec6dbcda3db (SMP w/8 CPU cores)
Kernel taint flags: TAINT_WARN
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8), LANGUAGE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)



Bug reassigned from package 'debian' to 'src:e2fsprogs'. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 25 Sep 2019 15:54:07 GMT) (full text, mbox, link).


No longer marked as found in versions 1.44.5-1+deb10u1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 25 Sep 2019 15:54:08 GMT) (full text, mbox, link).


Marked as found in versions e2fsprogs/1.44.5-1+deb10u1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 25 Sep 2019 15:54:09 GMT) (full text, mbox, link).


Marked as found in versions e2fsprogs/1.44.5-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 25 Sep 2019 15:54:09 GMT) (full text, mbox, link).


Marked as fixed in versions e2fsprogs/1.45.4-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 25 Sep 2019 15:54:10 GMT) (full text, mbox, link).


Added tag(s) upstream and fixed-upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 25 Sep 2019 15:54:11 GMT) (full text, mbox, link).


Marked as found in versions e2fsprogs/1.43.4-2. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Wed, 25 Sep 2019 16:03:03 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Thu Sep 26 16:46:11 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.