ArchLinux: 201503-8: e2fsprogs: arbitrary code execution
Summary
If corrupted file system didn't trip over some corruption check, and
then the file system was modified via tune2fs or debugfs, such that the
superblock was marked dirty and then written out via the closefs() path,
it's possible that the buffer overrun could be triggered when the file
system is closed.
This issue can lead to arbitrary code execution if a malicious device is
plugged in and the mounting process chooses to run fsck (or other
application using the ext2fs library) on the device's malicious filesystem.
Resolution
Upgrade to 1.42.12-2.
# pacman -Syu "e2fsprogs>=1.42.12-2"
The problem has been fixed upstream but no release is available yet.
References
https://git.kernel.org/pub/scm/fs/ext2/e2fsprogs.git/commit/ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1572 https://bugs.archlinux.org/task/44015
Workaround
None.