* CVE-2020-6104 "An exploitable information disclosure vulnerability exists in the get_dnode_of_data functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause information disclosure resulting in a information disclosure. An attacker can provide a malicious file to trigger this vulnerability." URL: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1046 * CVE-2020-6105 "An exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability." URL: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1047 * CVE-2020-6106 "An exploitable information disclosure vulnerability exists in the init_node_manager functionality of F2fs-Tools F2fs.Fsck 1.12 and 1.13. A specially crafted filesystem can be used to disclose information. An attacker can provide a malicious file to trigger this vulnerability." URL: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1048 * CVE-2020-6107 "An exploitable information disclosure vulnerability exists in the dev_read functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause an uninitialized read resulting in an information disclosure. An attacker can provide a malicious file to trigger this vulnerability." https://talosintelligence.com/vulnerability_reports/TALOS-2020-1049 * CVE-2020-6108 "An exploitable code execution vulnerability exists in the fsck_chk_orphan_node functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause a heap buffer overflow resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability." URL: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1050
Not clear if fixed in 1.14.
(In reply to Sam James from comment #1) > Not clear if fixed in 1.14. Let's just stabilize 1.14. It has been in the tree forever. KEYWORDS="amd64 arm arm64 ppc ppc64 x86"
Unable to check for sanity: > no match for package: sys-fs/f2fs-tools-1.14
All sanity-check issues have been resolved
x86 stable
arm64 done
arm done
ppc/ppc64 stable
amd64 stable, though no idea about cleanup then.
(In reply to Mikle Kolyada from comment #9) > amd64 stable, though no idea about cleanup then. I've removed 1.13.0 from the tree. The only remaining version is 1.14.0 which is the latest upstream.
This issue was resolved and addressed in GLSA 202101-26 at https://security.gentoo.org/glsa/202101-26 by GLSA coordinator Sam James (sam_c).