Out-of-bounds Write Affecting libcom_err package, versions <0:1.45.4-3.el8


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.08% (38th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-LIBCOMERR-1431789
  • published26 Jul 2021
  • disclosed27 Aug 2019

Introduced: 27 Aug 2019

CVE-2019-5094  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

Upgrade RHEL:8 libcom_err to version 0:1.45.4-3.el8 or higher.
This issue was patched in RHSA-2020:1913.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libcom_err package and not the libcom_err package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.

CVSS Base Scores

version 3.1