Out-of-bounds Write Affecting libcom_err package, versions <0:1.45.4-3.el8
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-LIBCOMERR-2040965
- published 26 Jul 2021
- disclosed 7 Jan 2020
Introduced: 7 Jan 2020
CVE-2019-5188 Open this link in a new tabHow to fix?
Upgrade Centos:8
libcom_err
to version 0:1.45.4-3.el8 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcom_err
package and not the libcom_err
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973
- https://access.redhat.com/security/cve/CVE-2019-5188
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/
- https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html
- https://access.redhat.com/errata/RHSA-2020:1913
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html
- https://usn.ubuntu.com/4249-1/
- https://security.netapp.com/advisory/ntap-20220506-0001/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/