Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 878885 (CVE-2022-40284) - <sys-fs/ntfs3g-2022.10.3: code execution via malicious filesystem
Summary: <sys-fs/ntfs3g-2022.10.3: code execution via malicious filesystem
Status: IN_PROGRESS
Alias: CVE-2022-40284
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://www.openwall.com/lists/oss-se...
Whiteboard: B2 [glsa]
Keywords:
Depends on: 878901
Blocks:
  Show dependency tree
 
Reported: 2022-10-31 14:11 UTC by John Helmert III
Modified: 2022-11-22 16:43 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-31 14:11:30 UTC
"This vulnerability may allow an attacker using a maliciously crafted
NTFS-formatted image file or external storage to potentially execute
arbitrary privileged code, if the attacker has either local access and
the ntfs-3g binary is setuid root, or if the attacker has physical
access to an external port to a computer which is configured to run
the ntfs-3g binary or one of the ntfsprogs tools when the external
storage is plugged into the computer. This vulnerability results from
incorrect validation of some of the NTFS metadata that could
potentially cause buffer overflow, which could be exploited by an
attacker. Common ways for attackers to gain physical access to a
machine is through social engineering or an evil maid attack on an
unattended computer."

Please bump to 2022.10.3.
Comment 1 Larry the Git Cow gentoo-dev 2022-10-31 17:30:10 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7cae66cff4d59bd8c976c22ac9dcdc082a61cebf

commit 7cae66cff4d59bd8c976c22ac9dcdc082a61cebf
Author:     Mike Gilbert <floppym@gentoo.org>
AuthorDate: 2022-10-31 17:23:15 +0000
Commit:     Mike Gilbert <floppym@gentoo.org>
CommitDate: 2022-10-31 17:23:15 +0000

    sys-fs/ntfs3g: add 2022.10.3, drop 2022.5.17-r1
    
    Bug: https://bugs.gentoo.org/878885
    Signed-off-by: Mike Gilbert <floppym@gentoo.org>

 sys-fs/ntfs3g/Manifest                                                | 1 +
 sys-fs/ntfs3g/{ntfs3g-2022.5.17-r1.ebuild => ntfs3g-2022.10.3.ebuild} | 0
 2 files changed, 1 insertion(+)
Comment 2 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2022-10-31 17:48:55 UTC
Thanks!
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2022-11-08 05:00:43 UTC
Please cleanup.
Comment 4 Larry the Git Cow gentoo-dev 2022-11-08 17:02:40 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=806a05a7096b096362ce56975a35cc8872f96c42

commit 806a05a7096b096362ce56975a35cc8872f96c42
Author:     Mike Gilbert <floppym@gentoo.org>
AuthorDate: 2022-11-08 17:01:42 +0000
Commit:     Mike Gilbert <floppym@gentoo.org>
CommitDate: 2022-11-08 17:01:48 +0000

    sys-fs/ntfs3g: drop 2022.5.17
    
    Bug: https://bugs.gentoo.org/878885
    Signed-off-by: Mike Gilbert <floppym@gentoo.org>

 sys-fs/ntfs3g/Manifest                |  1 -
 sys-fs/ntfs3g/ntfs3g-2022.5.17.ebuild | 83 -----------------------------------
 2 files changed, 84 deletions(-)
Comment 5 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-11-22 16:43:09 UTC
GLSA request filed