| Summary: | e2fsprogs new security issue CVE-2015-0247 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/632571/ | ||
| Whiteboard: | has_procedure advisory MGA4-32-OK mga4-64-ok | ||
| Source RPM: | e2fsprogs-1.42.9-2.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-02-05 18:44:39 CET
Fedora has issued an advisory for this on February 7: https://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html URL:
(none) =>
http://lwn.net/Vulnerabilities/632571/ Tested by creating a loopback filesystem image and playing with it a bit. $ dd if=/dev/zero of=foo.img bs=1M count=8 $ /sbin/mkfs.ext3 foo.img $ mkdir foofs # mount -t ext3 foo.img foofs # cp foo.tar.xz foofs/ # some file less than 8MB # umount foofs $ /sbin/dumpe2fs foo.img $ /sbin/fsck.ext3 foo.img $ /usr/sbin/e2freefrag /tmp/foo.img Testing complete Mageia 4 i586. Whiteboard:
(none) =>
has_procedure MGA4-32-OK Testing complete mga4 64 using same tests as David. Validating. Advisory uploaded. Please push to 4 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0061.html Status:
NEW =>
RESOLVED |