Security update for e2fsprogs
Announcement ID: | SUSE-SU-2018:1987-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities and has three security fixes can now be installed.
Description:
This update for e2fsprogs fixes the following issues:
Security issues fixed:
- CVE-2015-0247: Fixed couple of heap overflows in e2fsprogs (fsck, dumpe2fs, e2image...) (bsc#915402).
- CVE-2015-1572: Fixed potential buffer overflow in closefs() (bsc#918346).
Bug fixes:
- bsc#1038194: generic/405 test fails with /dev/mapper/thin-vol is inconsistent on ext4 file system.
- bsc#1009532: resize2fs hangs when trying to resize a large ext4 file system.
- bsc#960273: xfsprogs does not call %{?regenerate_initrd_post}.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Basesystem Module 15
zypper in -t patch SUSE-SLE-Module-Basesystem-15-2018-1353=1
Package List:
-
Basesystem Module 15 (x86_64)
- libcom_err2-32bit-debuginfo-1.43.8-4.3.1
- e2fsprogs-32bit-debuginfo-1.43.8-4.3.1
- libcom_err2-32bit-1.43.8-4.3.1
-
Basesystem Module 15 (aarch64 ppc64le s390x x86_64)
- libcom_err2-debuginfo-1.43.8-4.3.1
- e2fsprogs-devel-1.43.8-4.3.1
- libcom_err2-1.43.8-4.3.1
- libext2fs-devel-static-1.43.8-4.3.1
- libcom_err-devel-static-1.43.8-4.3.1
- e2fsprogs-1.43.8-4.3.1
- e2fsprogs-debuginfo-1.43.8-4.3.1
- libcom_err-devel-1.43.8-4.3.1
- libext2fs-devel-1.43.8-4.3.1
- e2fsprogs-debugsource-1.43.8-4.3.1
- libext2fs2-debuginfo-1.43.8-4.3.1
- libext2fs2-1.43.8-4.3.1
References:
- https://www.suse.com/security/cve/CVE-2015-0247.html
- https://www.suse.com/security/cve/CVE-2015-1572.html
- https://bugzilla.suse.com/show_bug.cgi?id=1009532
- https://bugzilla.suse.com/show_bug.cgi?id=1038194
- https://bugzilla.suse.com/show_bug.cgi?id=915402
- https://bugzilla.suse.com/show_bug.cgi?id=918346
- https://bugzilla.suse.com/show_bug.cgi?id=960273