openSUSE Security Update : e2fsprogs (openSUSE-2015-400)

medium Nessus Plugin ID 84013

Synopsis

The remote openSUSE host is missing a security update.

Description

e2fsprogs was updated to fix two security issues.

The following vulnerabilities were fixed :

- CVE-2015-1572: A local user could have executed arbitrary code by causing a crafted block group descriptor to be marked as dirty. Completes fix for CVE-2015-0247. (boo#918346)

- CVE-2015-0247: A local user could have executed arbitrary code via crafted block group descriptor data in a filesystem image. (boo#915402)

Solution

Update the affected e2fsprogs packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=918346

https://bugzilla.opensuse.org/show_bug.cgi?id=915402

Plugin Details

Severity: Medium

ID: 84013

File Name: openSUSE-2015-400.nasl

Version: 2.3

Type: local

Agent: unix

Published: 6/8/2015

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:e2fsprogs, p-cpe:/a:novell:opensuse:e2fsprogs-debuginfo, p-cpe:/a:novell:opensuse:e2fsprogs-debuginfo-32bit, p-cpe:/a:novell:opensuse:e2fsprogs-debugsource, p-cpe:/a:novell:opensuse:e2fsprogs-devel, p-cpe:/a:novell:opensuse:libcom_err-devel, p-cpe:/a:novell:opensuse:libcom_err-devel-32bit, p-cpe:/a:novell:opensuse:libcom_err2, p-cpe:/a:novell:opensuse:libcom_err2-32bit, p-cpe:/a:novell:opensuse:libcom_err2-debuginfo, p-cpe:/a:novell:opensuse:libcom_err2-debuginfo-32bit, p-cpe:/a:novell:opensuse:libext2fs-devel, p-cpe:/a:novell:opensuse:libext2fs-devel-32bit, p-cpe:/a:novell:opensuse:libext2fs2, p-cpe:/a:novell:opensuse:libext2fs2-32bit, p-cpe:/a:novell:opensuse:libext2fs2-debuginfo, p-cpe:/a:novell:opensuse:libext2fs2-debuginfo-32bit, cpe:/o:novell:opensuse:13.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 5/29/2015

Reference Information

CVE: CVE-2015-0247, CVE-2015-1572