CVE-2022-29973: relan exFAT 1.3.0 allows local users to obtain sensitive information (data from deleted files in the filesystem) in certain situations involving offsets beyond ValidDataLength. Possibly incorrect patches in https://github.com/relan/exfat/tree/validsize
This affects sys-fs/fuse-exfat, not sys-fs/exfat-utils.
https://github.com/relan/exfat/issues/185 states the need for a bit of "polishing". Should the patch still be pulled? Or should we wait for upstream to get the patch to a desired state?
I plan to wait until upstream merges some change to the master branch.
Issue says fixed in 1.4.0
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=259afa056e0f327d7914ed0f15f623c908afca15 commit 259afa056e0f327d7914ed0f15f623c908afca15 Author: Sam James <sam@gentoo.org> AuthorDate: 2023-03-13 21:14:23 +0000 Commit: Sam James <sam@gentoo.org> CommitDate: 2023-03-13 21:14:23 +0000 sys-fs/fuse-exfat: add 1.4.0 Bug: https://bugs.gentoo.org/842213 Signed-off-by: Sam James <sam@gentoo.org> sys-fs/fuse-exfat/Manifest | 1 + sys-fs/fuse-exfat/fuse-exfat-1.4.0.ebuild | 24 ++++++++++++++++++++++++ 2 files changed, 25 insertions(+)
Please clean up vulnerable version fuse-exfat-1.3.0.