You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa e2fsprogs

Sigurnosni nedostatak programskog paketa e2fsprogs

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

Fedora Update Notification
2015-02-07 00:49:13

Name : e2fsprogs
Product : Fedora 21
Version : 1.42.12
Release : 1.fc21
Summary : Utilities for managing ext2, ext3, and ext4 filesystems
Description :
The e2fsprogs package contains a number of utilities for creating,
checking, modifying, and correcting any inconsistencies in second,
third and fourth extended (ext2/ext3/ext4) filesystems. E2fsprogs
contains e2fsck (used to repair filesystem inconsistencies after an
unclean shutdown), mke2fs (used to initialize a partition to contain
an empty ext2 filesystem), debugfs (used to examine the internal
structure of a filesystem, to manually repair a corrupted
filesystem, or to create test cases for e2fsck), tune2fs (used to
modify filesystem parameters), and most of the other core ext2fs
filesystem utilities.

You should install the e2fsprogs package if you need to manage the
performance of an ext2, ext3, or ext4 filesystem.

Update Information:

New upstream release
Security fix for CVE-2015-0247

* Thu Feb 5 2015 Eric Sandeen <> 1.42.12-1
– New upstream release
– Security fix for CVE-2015-0247

[ 1 ] Bug #1187032 – CVE-2015-0247 e2fsprogs: ext2fs_open2() missing first_meta_bg boundary check leading to heap buffer overflow (oCERT-015-002)

This update can be installed with the “yum” update program. Use
su -c ‘yum update e2fsprogs’ at the command line.
For more information, refer to “Managing Software with yum”,
available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list

AutorMarko Stanec
Cert idNCERT-REF-2015-02-0027-ADV
More in Preporuke
Sigurnosni nedostaci programskog paketa Libav

Otkriveni su sigurnosni nedostaci u programskom paketu Libav. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanjem usluge i stjecanje uvećanih...