Vulnerability Name:

CVE-2022-1304 (CCN-224602)

Assigned:2022-03-24
Published:2022-03-24
Updated:2023-02-12
Summary:An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.
CVSS v3 Severity:7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.0 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)
6.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): High
5.8 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)
5.1 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H/E:U/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): High
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.6 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Complete
Vulnerability Type:CWE-787)
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2022-1304

Source: CCN
Type: e2fsprogs Web site
e2fsprogs

Source: CCN
Type: Red Hat Bugzilla - Bug 2069726
(CVE-2022-1304) - CVE-2022-1304 e2fsprogs: out-of-bounds read/write via crafted filesystem

Source: secalert@redhat.com
Type: Issue Tracking, Third Party Advisory
secalert@redhat.com

Source: XF
Type: UNKNOWN
e2fsprogs-cve20221304-code-exec(224602)

Source: CCN
Type: IBM Security Bulletin 6843909 (App Connect Enterprise Certified Container)
IBM App Connect Enterprise Certified Container may be vulnerable to arbitrary code execution due to CVE-2022-1304

Source: CCN
Type: IBM Security Bulletin 6848319 (Voice Gateway)
Multiple Vulnerabilities in base image packages affect IBM Voice Gateway

Source: CCN
Type: IBM Security Bulletin 6851363 (MQ Operator)
IBM MQ Operator and Queue manager container images are vulnerable to multiple vulnerabilities from krb5 and e2fsprogs

Source: CCN
Type: IBM Security Bulletin 6852221 (Cloud Transformation Advisor)
IBM Cloud Transformation Advisor is vulnerable to multiple vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6921283 (Robotic Process Automation for Cloud Pak)
Multiple Security Vulnerabilities may affect IBM Robotic Process Automation for Cloud Pak.

Source: CCN
Type: IBM Security Bulletin 6955071 (Cloud Pak for Network Automation)
IBM Cloud Pak for Network Automation v2.4.3 addresses multiple security vulnerabilities

Source: CCN
Type: IBM Security Bulletin 6967012 (Cloud Pak for Watson AIOps)
Multiple Vulnerabilities in CloudPak for Watson AIOPs

Source: CCN
Type: IBM Security Bulletin 6967639 (Watson Speech Services Cartridge for Cloud Pak for Data)
IBM Watson Speech Services Cartridge for IBM Cloud Pak for Data is vulnerable to an arbitrary code execution in e2fsprogs (CVE-2022-1304)

Source: CCN
Type: IBM Security Bulletin 6982841 (Netcool Operations Insight)
Netcool Operations Insight v1.6.8 addresses multiple security vulnerabilities.

Source: CCN
Type: IBM Security Bulletin 7001867 (Cloud Pak for Security)
IBM Cloud Pak for Security includes components with multiple known vulnerabilities

Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::crb:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:8:*:*:*:*:*:*:*
  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:8::baseos:*:*:*:*:*
  • Configuration RedHat 5:
  • cpe:/a:redhat:enterprise_linux:9:*:*:*:*:*:*:*
  • Configuration RedHat 6:
  • cpe:/a:redhat:enterprise_linux:9::appstream:*:*:*:*:*
  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:9:*:*:*:*:*:*:*
  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:9::baseos:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:e2fsprogs_project:e2fsprogs:1.46.5:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:voice_gateway:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:voice_gateway:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_transformation_advisor:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:voice_gateway:1.0.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:voice_gateway:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:voice_gateway:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:voice_gateway:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:voice_gateway:1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:4.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:cloud_pak_for_security:1.10.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.0:*:*:*:lts:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:app_connect_enterprise_certified_container:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:robotic_process_automation_for_cloud_pak:21.0.7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7487
    P
    e2fsprogs-1.46.4-150400.3.3.1 on GA media (Moderate)
    2023-06-12
    oval:com.redhat.rhsa:def:20228361
    P
    RHSA-2022:8361: e2fsprogs security update (Moderate)
    2022-11-15
    oval:com.redhat.rhsa:def:20227720
    P
    RHSA-2022:7720: e2fsprogs security and bug fix update (Moderate)
    2022-11-08
    oval:org.opensuse.security:def:3602
    P
    libgypsy0-0.9-6.22 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:5243
    P
    Security update for e2fsprogs (Important)
    2022-05-17
    oval:org.opensuse.security:def:93455
    P
    (Important)
    2022-05-17
    oval:org.opensuse.security:def:485
    P
    Security update for e2fsprogs (Important)
    2022-05-17
    oval:org.opensuse.security:def:94238
    P
    (Important)
    2022-05-17
    oval:org.opensuse.security:def:125711
    P
    Security update for e2fsprogs (Important)
    2022-05-17
    oval:org.opensuse.security:def:6040
    P
    Security update for e2fsprogs (Important)
    2022-05-17
    oval:org.opensuse.security:def:93609
    P
    (Important)
    2022-05-17
    oval:org.opensuse.security:def:94447
    P
    (Important)
    2022-05-17
    oval:org.opensuse.security:def:93137
    P
    (Important)
    2022-05-17
    oval:org.opensuse.security:def:126876
    P
    Security update for e2fsprogs (Important)
    2022-05-17
    oval:org.opensuse.security:def:93812
    P
    (Important)
    2022-05-17
    oval:org.opensuse.security:def:95232
    P
    Security update for e2fsprogs (Important)
    2022-05-17
    oval:org.opensuse.security:def:93297
    P
    (Important)
    2022-05-17
    oval:org.opensuse.security:def:127273
    P
    Security update for e2fsprogs (Important)
    2022-05-17
    oval:org.opensuse.security:def:94026
    P
    (Important)
    2022-05-17
    oval:org.opensuse.security:def:119578
    P
    Security update for e2fsprogs (Important)
    2022-05-16
    oval:org.opensuse.security:def:891
    P
    Security update for e2fsprogs (Important)
    2022-05-16
    oval:org.opensuse.security:def:119095
    P
    Security update for e2fsprogs (Important)
    2022-05-16
    oval:org.opensuse.security:def:42384
    P
    Security update for e2fsprogs (Important)
    2022-05-16
    oval:org.opensuse.security:def:119203
    P
    Security update for e2fsprogs (Important)
    2022-05-16
    oval:org.opensuse.security:def:118706
    P
    Security update for e2fsprogs (Important)
    2022-05-16
    oval:org.opensuse.security:def:42183
    P
    Security update for e2fsprogs (Important)
    2022-05-16
    oval:org.opensuse.security:def:119393
    P
    Security update for e2fsprogs (Important)
    2022-05-16
    oval:org.opensuse.security:def:118896
    P
    Security update for e2fsprogs (Important)
    2022-05-16
    oval:org.opensuse.security:def:42285
    P
    Security update for e2fsprogs (Important)
    2022-05-16
    BACK
    e2fsprogs_project e2fsprogs 1.46.5
    ibm voice gateway 1.0.2
    ibm voice gateway 1.0.3
    ibm cloud transformation advisor 2.0.1
    ibm voice gateway 1.0.2.4
    ibm voice gateway 1.0.4
    ibm voice gateway 1.0.5
    ibm voice gateway 1.0.6
    ibm voice gateway 1.0.7
    ibm app connect enterprise certified container 4.1
    ibm app connect enterprise certified container 4.2
    ibm robotic process automation for cloud pak 21.0.1
    ibm cloud pak for security 1.10.0.0
    ibm app connect enterprise certified container 5.0
    ibm app connect enterprise certified container 5.1
    ibm app connect enterprise certified container 5.2
    ibm app connect enterprise certified container 6.0
    ibm app connect enterprise certified container 6.1
    ibm robotic process automation for cloud pak 21.0.7