| Name | CVE-2019-5188 |
| Description | A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-2156-1, DLA-2290-1 |
| Debian Bugs | 948508 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| e2fsprogs (PTS) | bullseye | 1.46.2-2 | fixed |
| bullseye (security) | 1.46.2-2+deb11u1 | fixed | |
| bookworm | 1.47.0-2 | fixed | |
| forky, sid, trixie | 1.47.2-3 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| e2fsprogs | source | jessie | 1.42.12-2+deb8u2 | DLA-2156-1 | ||
| e2fsprogs | source | stretch | 1.43.4-2+deb9u2 | DLA-2290-1 | ||
| e2fsprogs | source | buster | 1.44.5-1+deb10u3 | |||
| e2fsprogs | source | (unstable) | 1.45.5-1 | 948508 |
Fixed by: https://git.kernel.org/pub/scm/fs/ext2/e2fsprogs.git/commit/?id=8dd73c149f418238f19791f9d666089ef9734dff
Further hardening: https://git.kernel.org/pub/scm/fs/ext2/e2fsprogs.git/commit/?id=71ba137571ba13755337e19c9a826dfc874562a36e1b24d3
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973