Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 717640 (CVE-2019-9755) - <sys-fs/ntfs3g-2017.3.23-r3: Integer underflow vulnerability (CVE-2019-9755)
Summary: <sys-fs/ntfs3g-2017.3.23-r3: Integer underflow vulnerability (CVE-2019-9755)
Status: RESOLVED FIXED
Alias: CVE-2019-9755
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B2 [glsa+ cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2020-04-16 00:07 UTC by GLSAMaker/CVETool Bot
Modified: 2020-07-27 01:02 UTC (History)
2 users (show)

See Also:
Package list:
sys-fs/ntfs3g-2017.3.23-r3 amd64 arm ppc ppc64 sparc x86
Runtime testing required: ---
nattka: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2020-04-16 00:07:48 UTC
CVE-2019-9755 (https://nvd.nist.gov/vuln/detail/CVE-2019-9755):
  An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker
  could potentially exploit this by running /bin/ntfs-3g with specially
  crafted arguments from a specially crafted directory to cause a heap buffer
  overflow, resulting in a crash or the ability to execute arbitrary code. In
  installations where /bin/ntfs-3g is a setuid-root binary, this could lead to
  a local escalation of privileges.
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-22 01:29:39 UTC
@maintainer(s): ping
Comment 2 Mike Gilbert gentoo-dev 2020-04-22 03:28:54 UTC
(In reply to Sam James (sec padawan) from comment #1)
> @maintainer(s): ping

Not sure what you want from the maintainer; there's no detailed information about the problem, and I don't see any new releases upstream.
Comment 3 Mike Gilbert gentoo-dev 2020-04-22 03:51:33 UTC
Nevermind; after digging through the Red Hat advisories, and the related bug, I think I found it.

https://bugzilla.redhat.com/show_bug.cgi?id=1691624

https://sourceforge.net/p/ntfs-3g/ntfs-3g/ci/85c1634a26faa572d3c558d4cf8aaaca5202d4e9/
Comment 4 Larry the Git Cow gentoo-dev 2020-04-22 04:20:48 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=46fe392026d1cf6fb21c54a418fcb20b4861f1e7

commit 46fe392026d1cf6fb21c54a418fcb20b4861f1e7
Author:     Mike Gilbert <floppym@gentoo.org>
AuthorDate: 2020-04-22 04:18:39 +0000
Commit:     Mike Gilbert <floppym@gentoo.org>
CommitDate: 2020-04-22 04:18:39 +0000

    sys-fs/ntfs3g: apply fix for CVE-2019-9755
    
    Bug: https://bugs.gentoo.org/717640
    Signed-off-by: Mike Gilbert <floppym@gentoo.org>

 sys-fs/ntfs3g/files/CVE-2019-9755.patch  |  63 ++++++++++++++++++
 sys-fs/ntfs3g/ntfs3g-2017.3.23-r3.ebuild | 106 +++++++++++++++++++++++++++++++
 2 files changed, 169 insertions(+)
Comment 5 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-22 11:26:31 UTC
(In reply to Mike Gilbert from comment #2)
> (In reply to Sam James (sec padawan) from comment #1)
> > @maintainer(s): ping
> 
> Not sure what you want from the maintainer; there's no detailed information
> about the problem, and I don't see any new releases upstream.

Apologies, I thought I had linked the patch. I usually do this for convenience. Thank you for digging it up.
Comment 6 Agostino Sarubbo gentoo-dev 2020-04-22 17:01:22 UTC
amd64 stable
Comment 7 Agostino Sarubbo gentoo-dev 2020-04-23 06:23:05 UTC
arm stable
Comment 8 Agostino Sarubbo gentoo-dev 2020-04-23 06:25:09 UTC
ppc stable
Comment 9 Agostino Sarubbo gentoo-dev 2020-04-23 06:28:10 UTC
sparc stable
Comment 10 Agostino Sarubbo gentoo-dev 2020-04-23 06:31:00 UTC
x86 stable
Comment 11 Agostino Sarubbo gentoo-dev 2020-04-23 10:40:35 UTC
ppc64 stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 12 Larry the Git Cow gentoo-dev 2020-06-09 23:41:32 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=3f7be9e54a478c557dba6ffe32362d7cc5b4d107

commit 3f7be9e54a478c557dba6ffe32362d7cc5b4d107
Author:     Mike Gilbert <floppym@gentoo.org>
AuthorDate: 2020-06-09 23:40:02 +0000
Commit:     Mike Gilbert <floppym@gentoo.org>
CommitDate: 2020-06-09 23:41:22 +0000

    sys-fs/ntfs3g: remove old
    
    Bug: https://bugs.gentoo.org/717640
    Signed-off-by: Mike Gilbert <floppym@gentoo.org>

 sys-fs/ntfs3g/Manifest                   |   1 -
 sys-fs/ntfs3g/files/99-ntfs3g.rules      |   1 -
 sys-fs/ntfs3g/ntfs3g-2016.2.22-r2.ebuild |  96 ----------------------------
 sys-fs/ntfs3g/ntfs3g-2017.3.23-r1.ebuild |  93 ---------------------------
 sys-fs/ntfs3g/ntfs3g-2017.3.23-r2.ebuild | 104 -------------------------------
 5 files changed, 295 deletions(-)
Comment 13 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-06-09 23:47:06 UTC
Thanks.
Comment 14 GLSAMaker/CVETool Bot gentoo-dev 2020-07-27 01:02:15 UTC
This issue was resolved and addressed in
 GLSA 202007-45 at https://security.gentoo.org/glsa/202007-45
by GLSA coordinator Sam James (sam_c).