CVE-2019-9755 (https://nvd.nist.gov/vuln/detail/CVE-2019-9755): An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.
@maintainer(s): ping
(In reply to Sam James (sec padawan) from comment #1) > @maintainer(s): ping Not sure what you want from the maintainer; there's no detailed information about the problem, and I don't see any new releases upstream.
Nevermind; after digging through the Red Hat advisories, and the related bug, I think I found it. https://bugzilla.redhat.com/show_bug.cgi?id=1691624 https://sourceforge.net/p/ntfs-3g/ntfs-3g/ci/85c1634a26faa572d3c558d4cf8aaaca5202d4e9/
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=46fe392026d1cf6fb21c54a418fcb20b4861f1e7 commit 46fe392026d1cf6fb21c54a418fcb20b4861f1e7 Author: Mike Gilbert <floppym@gentoo.org> AuthorDate: 2020-04-22 04:18:39 +0000 Commit: Mike Gilbert <floppym@gentoo.org> CommitDate: 2020-04-22 04:18:39 +0000 sys-fs/ntfs3g: apply fix for CVE-2019-9755 Bug: https://bugs.gentoo.org/717640 Signed-off-by: Mike Gilbert <floppym@gentoo.org> sys-fs/ntfs3g/files/CVE-2019-9755.patch | 63 ++++++++++++++++++ sys-fs/ntfs3g/ntfs3g-2017.3.23-r3.ebuild | 106 +++++++++++++++++++++++++++++++ 2 files changed, 169 insertions(+)
(In reply to Mike Gilbert from comment #2) > (In reply to Sam James (sec padawan) from comment #1) > > @maintainer(s): ping > > Not sure what you want from the maintainer; there's no detailed information > about the problem, and I don't see any new releases upstream. Apologies, I thought I had linked the patch. I usually do this for convenience. Thank you for digging it up.
amd64 stable
arm stable
ppc stable
sparc stable
x86 stable
ppc64 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=3f7be9e54a478c557dba6ffe32362d7cc5b4d107 commit 3f7be9e54a478c557dba6ffe32362d7cc5b4d107 Author: Mike Gilbert <floppym@gentoo.org> AuthorDate: 2020-06-09 23:40:02 +0000 Commit: Mike Gilbert <floppym@gentoo.org> CommitDate: 2020-06-09 23:41:22 +0000 sys-fs/ntfs3g: remove old Bug: https://bugs.gentoo.org/717640 Signed-off-by: Mike Gilbert <floppym@gentoo.org> sys-fs/ntfs3g/Manifest | 1 - sys-fs/ntfs3g/files/99-ntfs3g.rules | 1 - sys-fs/ntfs3g/ntfs3g-2016.2.22-r2.ebuild | 96 ---------------------------- sys-fs/ntfs3g/ntfs3g-2017.3.23-r1.ebuild | 93 --------------------------- sys-fs/ntfs3g/ntfs3g-2017.3.23-r2.ebuild | 104 ------------------------------- 5 files changed, 295 deletions(-)
Thanks.
This issue was resolved and addressed in GLSA 202007-45 at https://security.gentoo.org/glsa/202007-45 by GLSA coordinator Sam James (sam_c).