CVE-2015-0247
Description
Heap-based buffer overflow in openfs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code via crafted block group descriptor data in a filesystem image.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Heap buffer overflow in libext2fs' openfs.c allows local users to execute arbitrary code via a crafted filesystem image.
Vulnerability
A heap-based buffer overflow exists in the openfs.c file of the libext2fs library in e2fsprogs before version 1.42.12. The flaw occurs when processing block group descriptor data without a proper boundary check on first_meta_bg. An attacker can trigger the overflow by supplying a specially crafted filesystem image [1][2][3].
Exploitation
An attacker needs only local access to the system and the ability to present a malicious filesystem image to an affected utility (e.g., e2fsck, mount, or debugfs). No special privileges are required beyond local user access. The exploitation involves opening the crafted image, which triggers the missing boundary check and leads to writing data beyond the allocated heap buffer [1][2].
Impact
Successful exploitation allows the attacker to corrupt heap memory, potentially leading to arbitrary code execution. Since many e2fsprogs utilities run with root privileges when repairing or mounting filesystems, this can result in full privilege escalation and compromise of the affected system [1][2][3].
Mitigation
The vulnerability was fixed in e2fsprogs version 1.42.12. Distributions such as Ubuntu and Mageia have released updated packages (e.g., Ubuntu via USN-2507-1 on 23 February 2015, Mageia via MGASA-2015-0061 on 11 February 2015) [2][3]. Users should upgrade to the patched version or apply the relevant security update from their vendor. Red Hat classified the bug as WONTFIX in some products [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
14cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- Range: <1.42.12
- osv-coords5 versionspkg:rpm/suse/e2fsprogs&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/e2fsprogs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015pkg:rpm/suse/e2fsprogs&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/e2fsprogs&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/e2fsprogs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 1.42.11-7.1+ 4 more
- (no CPE)range: < 1.42.11-7.1
- (no CPE)range: < 1.43.8-4.3.1
- (no CPE)range: < 1.42.11-7.1
- (no CPE)range: < 1.42.11-7.1
- (no CPE)range: < 1.42.11-7.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
18- www.ocert.org/advisories/ocert-2015-002.htmlnvdUS Government Resource
- advisories.mageia.org/MGASA-2015-0061.htmlnvd
- git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/nvd
- lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.htmlnvd
- lists.opensuse.org/opensuse-updates/2015-06/msg00010.htmlnvd
- packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.htmlnvd
- www.debian.org/security/2015/dsa-3166nvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.securityfocus.com/archive/1/534633/100/0/threadednvd
- www.securityfocus.com/bid/72520nvd
- www.ubuntu.com/usn/USN-2507-1nvd
- bugzilla.redhat.com/show_bug.cginvd
- exchange.xforce.ibmcloud.com/vulnerabilities/100740nvd
- security.gentoo.org/glsa/201701-06nvd
News mentions
0No linked articles in our index yet.