Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 838388 (CVE-2022-1304) - <sys-fs/e2fsprogs-1.46.6: code execution via specially crafted filesystem
Summary: <sys-fs/e2fsprogs-1.46.6: code execution via specially crafted filesystem
Status: RESOLVED FIXED
Alias: CVE-2022-1304
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard: A2 [glsa+]
Keywords:
Depends on:
Blocks:
 
Reported: 2022-04-15 00:32 UTC by John Helmert III
Modified: 2024-02-18 08:04 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-04-15 00:32:50 UTC
CVE-2022-1304 (https://bugzilla.redhat.com/show_bug.cgi?id=2069726):

An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-04-28 15:50:51 UTC
Ts'o says he's applied this, but I don't see it in git yet:

https://lore.kernel.org/linux-ext4/20220421173148.20193-1-lczerner@redhat.com/
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-17 19:28:04 UTC
Looks like there's a set of Ted patches for fuzzing issues:

https://lore.kernel.org/all/20220607042444.1798015-6-tytso@mit.edu/T/

Czerner's patch ended up in git as ab51d587bb9b229b1fade1afd02e1574c1ba5c76 unreleased afaict
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-12-13 20:05:14 UTC
(In reply to John Helmert III from comment #2)
> Looks like there's a set of Ted patches for fuzzing issues:
> 
> https://lore.kernel.org/all/20220607042444.1798015-6-tytso@mit.edu/T/
> 
> Czerner's patch ended up in git as ab51d587bb9b229b1fade1afd02e1574c1ba5c76
> unreleased afaict

~/git/e2fsprogs $ git tag --contains ab51d58
v1.46.6-rc1
Comment 4 Hans de Graaff gentoo-dev Security 2023-10-08 09:23:26 UTC
Please clean up vulnerable version 1.46.5-r4.
Comment 5 Larry the Git Cow gentoo-dev 2024-02-18 08:02:42 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=2c1145bba802b0b17dfc629247db2a687bb29c6c

commit 2c1145bba802b0b17dfc629247db2a687bb29c6c
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2024-02-18 07:59:58 +0000
Commit:     Hans de Graaff <graaff@gentoo.org>
CommitDate: 2024-02-18 08:02:38 +0000

    [ GLSA 202402-15 ] e2fsprogs: Arbitrary Code Execution
    
    Bug: https://bugs.gentoo.org/838388
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: Hans de Graaff <graaff@gentoo.org>

 glsa-202402-15.xml | 42 ++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 42 insertions(+)