From patchwork Fri Jul 1 08:20:55 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ranjitsinh Rathod X-Patchwork-Id: 9730 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id E1F51CCA482 for ; Fri, 1 Jul 2022 08:22:16 +0000 (UTC) Received: from IND01-MAX-obe.outbound.protection.outlook.com (IND01-MAX-obe.outbound.protection.outlook.com [40.107.222.44]) by mx.groups.io with SMTP id smtpd.web10.35683.1656663726996712514 for ; Fri, 01 Jul 2022 01:22:09 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@kpit.com header.s=selector1 header.b=pApWaXgI; spf=pass (domain: kpit.com, ip: 40.107.222.44, mailfrom: ranjitsinh.rathod@kpit.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BSFew+bsL/chXY4GCw4IID9HSziorzw7uFjsAubocUgkinVAPZR26txM6OSRZNhlHHGPc3eRuHQKI2IciE3VHRswP6e6kfTBbobaq2VNDgQvw5C+1+ZccSC2Xy+d5n8D7Dp5yTXrwxfMW+554qaoncZOsguFOVuD5z7QSfMTMwKeo1QBMXwVMPDFZqH8LGFERtAgVpGGxyCdvI6UMc2UlIBa/Xv7uhfN8TDpvSr5epMt6bcBvHqYN4BT4YVUXQLzzvM1lK/9cuPoho2uufRz11ph0HVSLjClfaTRPc0vDlioPeK+JL7tqGj0VX5osFe5Mlz0CylDASkKUgy/+NlvSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=BnQNwGAAbfabSZpgjrkT9H4tMiulVMLlv2rpTkoiYZs=; b=Mzu3SYHkioGp/ncD/Fri7OafUOYjKmDC1F+i4D9Z/wJfMUaYN7UpkmzJbu3yDYnXQHTJ+8wg1Nc9z3Fqp/ziF1oGzwG5kkQ8aFsHMGOtV1qli+uH/ALc90x7QUNOIK9P+YiRfprDeiIynTaadgN0Kfxywl35YtRLAPFvAfdCFWhWeftcjpvp0TdnQci0DLIGffpOZUdmL9gwzgdvv7HZsb120a+HDH4RdBkSJxoeG/4Qbk76ozr7zPpyFx3XiRTObY9csD+mcS8JA+V4oxdi7bFSHS8TuQ9GJGoy996CgnsYrrFyDhXSMXBN27mCntEJ39r8I+cCGuZ3McR0Eo4bUg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kpit.com; dmarc=pass action=none header.from=kpit.com; dkim=pass header.d=kpit.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kpit.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BnQNwGAAbfabSZpgjrkT9H4tMiulVMLlv2rpTkoiYZs=; b=pApWaXgIQD7dIiFwRWpaJ2kuVFEXJ729q3nMwFnoTU+GuhRyBmtwlEJowexfisXSjTyaIIoKQh3xpyrCHf5E91uSG5/sqw2nuM9o65NT03XW4AKEyHF3lsQf4ruA2Ry/O1wzULKZFxzxElgS7LHG+kmHePRSmUf9demu3ntoG0w= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=kpit.com; Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) by PN3PR01MB6983.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:aa::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5395.14; Fri, 1 Jul 2022 08:21:59 +0000 Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e]) by PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e%4]) with mapi id 15.20.5395.015; Fri, 1 Jul 2022 08:21:59 +0000 From: Ranjith Rathod To: openembedded-devel@lists.openembedded.org, omkar.patil@kpit.com Cc: Chen Qi , Khem Raj , Omkar Patil , Ranjitsinh Rathod Subject: [oe][meta-filesystems][dunfell][PATCH 1/8] ntfs-3g-ntfsprogs: upgrade to 2021.8.22 Date: Fri, 1 Jul 2022 13:50:55 +0530 Message-Id: <20220701082102.17835-2-ranjitsinh.rathod@kpit.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> References: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> X-ClientProxiedBy: PN2PR01CA0120.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:27::35) To PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 73ab0d00-0f5a-4da3-db21-08da5b3ac49c X-MS-TrafficTypeDiagnostic: PN3PR01MB6983:EE_ X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230016)(4636009)(366004)(376002)(136003)(39860400002)(346002)(396003)(6666004)(41300700001)(2906002)(86362001)(1076003)(2616005)(5660300002)(966005)(54906003)(6486002)(186003)(6512007)(478600001)(6506007)(8936002)(107886003)(52116002)(6636002)(38100700002)(316002)(36756003)(8676002)(4326008)(66476007)(83380400001)(66556008)(66574015)(66946007);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: kpit.com X-MS-Exchange-CrossTenant-Network-Message-Id: 73ab0d00-0f5a-4da3-db21-08da5b3ac49c X-MS-Exchange-CrossTenant-AuthSource: PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Jul 2022 08:21:59.4003 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3539451e-b46e-4a26-a242-ff61502855c7 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: FY0MfyXeoM7WU6HP9gHqhWkUn1/o6nJ+0kJ6iT5vXfB1vNE6YvHC6faG++Dj/VhzZ6WZ8fZ3eKYj47A48kpBlg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PN3PR01MB6983 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 01 Jul 2022 08:22:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/97653 From: Chen Qi This upgrade revolves a bunch of CVEs. See more details in: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-q759-8j5v-q5jp. Fixed CVE's: CVE-2021-33285 CVE-2021-33289 CVE-2021-33286 CVE-2021-35266 CVE-2021-33287 CVE-2021-35267 CVE-2021-35268 CVE-2021-35269 CVE-2021-39251 CVE-2021-39252 CVE-2021-39253 CVE-2021-39254 CVE-2021-39255 CVE-2021-39256 CVE-2021-39257 CVE-2021-39258 CVE-2021-39259 CVE-2021-39260 CVE-2021-39261 CVE-2021-39262 CVE-2021-39263 Signed-off-by: Chen Qi Signed-off-by: Khem Raj (cherry picked from commit 6791dc536444a1dd0f473653501ba43fc84704f2) Signed-off-by: Omkar Patil Signed-off-by: Ranjitsinh Rathod --- ...-ntfsprogs_2017.3.23.bb => ntfs-3g-ntfsprogs_2021.8.22.bb} | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) rename meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/{ntfs-3g-ntfsprogs_2017.3.23.bb => ntfs-3g-ntfsprogs_2021.8.22.bb} (92%) -- 2.17.1 This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails. diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2017.3.23.bb b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb similarity index 92% rename from meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2017.3.23.bb rename to meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb index 6f5cb6cee..19b2d6ca2 100644 --- a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2017.3.23.bb +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb @@ -10,8 +10,8 @@ SRC_URI = "http://tuxera.com/opensource/ntfs-3g_ntfsprogs-${PV}.tgz \ file://0001-libntfs-3g-Makefile.am-fix-install-failed-while-host.patch \ " S = "${WORKDIR}/ntfs-3g_ntfsprogs-${PV}" -SRC_URI[md5sum] = "d97474ae1954f772c6d2fa386a6f462c" -SRC_URI[sha256sum] = "3e5a021d7b761261836dcb305370af299793eedbded731df3d6943802e1262d5" +SRC_URI[md5sum] = "90da343e78877d388eb34cefae6799ae" +SRC_URI[sha256sum] = "55b883aa05d94b2ec746ef3966cb41e66bed6db99f22ddd41d1b8b94bb202efb" UPSTREAM_CHECK_URI = "https://www.tuxera.com/community/open-source-ntfs-3g/" UPSTREAM_CHECK_REGEX = "ntfs-3g_ntfsprogs-(?P\d+(\.\d+)+)\.tgz" From patchwork Fri Jul 1 08:20:56 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ranjitsinh Rathod X-Patchwork-Id: 9731 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D0570C43334 for ; Fri, 1 Jul 2022 08:22:16 +0000 (UTC) Received: from IND01-MAX-obe.outbound.protection.outlook.com (IND01-MAX-obe.outbound.protection.outlook.com [40.107.222.44]) by mx.groups.io with SMTP id smtpd.web10.35683.1656663726996712514 for ; Fri, 01 Jul 2022 01:22:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@kpit.com header.s=selector1 header.b=hx3BYl1W; spf=pass (domain: kpit.com, ip: 40.107.222.44, mailfrom: ranjitsinh.rathod@kpit.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Dbq8goSIMbs71D+ZsVuGNU8Pip3uHIYHiJOWUFdYuY5MHW5KJ076vDAfKU3XJ2dnsAK+PWurmZHz4yF2I/OF95/1pKvziFKTcnPJg1+S2tYf3l7MXi30Ksi2Is+YtR5aT79bLOmzUtyXZNDEaNbrge/Q4uicQIvFFriMuxD1pMnFh5OaWFdKoLash0R09b54MngZSuBzRMc6gsqxo1BTF1Goc/FDRs0O+B8Q4og3hPD3SrKjG/NEXRqFKTaWtg+MvgY7nuHEzf2F2toKb/IEhZYwZZ+R2OlTvdQQgPZTpp+y1HUlb9mQ2vINcNdolm0u59aqiKsc5hG7YAgTTdsZDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Y1Bf0thflX9dPtr+cAdCWTDZWxGkwNTA2MPoGe1DxWY=; b=XGrMyg1HUi71fyyQQOz4AB0dnE6Z4kG720FeYn46hj1yBoCSCM1Kgce7i/mRiTb4zM8sfCKIeZPO8QJQDkRk9rxTn0XuZyMqEo9HywTTk3ZplF3lTDHcls9KWJq0Y4LgJ2kDa79+704qKNZiN2Q+J27QKT/HyhnsTvCk0ZL7ziYjn2gRx3/1R26qThVne1fFotle0sYDosXx4YvmD7p+9DDWNEM0AeKHjrl7E0KZIpYQMN4gy8oRPpO8MU8GyBDvhvrv7AAI6QhXruwPDyQmoTYOAjdPkKTirItfTWc5bhiNcv7Nc0TR/ixqRpKJta5wMmY/7nbcJv7LruYDdNm9Mw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kpit.com; dmarc=pass action=none header.from=kpit.com; dkim=pass header.d=kpit.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kpit.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Y1Bf0thflX9dPtr+cAdCWTDZWxGkwNTA2MPoGe1DxWY=; b=hx3BYl1Wty0taOQfw9KobTM4f+ljUHWNLRCYqYK0oIP1ClQ9iG9DoAP2iqPRvhdRiQS0/PsObekWrp1U0ib4gHg/2SolQSuaPcgFDOODqaVE+aHJ0Ed8jHICFfulhdsM2WFCBaE9p3f15OOcypBUzF04+YxMu7za/WOh6OLo6yA= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=kpit.com; Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) by PN3PR01MB6983.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:aa::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5395.14; Fri, 1 Jul 2022 08:22:01 +0000 Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e]) by PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e%4]) with mapi id 15.20.5395.015; Fri, 1 Jul 2022 08:22:01 +0000 From: Ranjith Rathod To: openembedded-devel@lists.openembedded.org, omkar.patil@kpit.com Cc: Ranjitsinh Rathod Subject: [oe][meta-filesystems][dunfell][PATCH 2/8] ntfs-3g-ntfsprogs: Fix CVE-2021-46790 Date: Fri, 1 Jul 2022 13:50:56 +0530 Message-Id: <20220701082102.17835-3-ranjitsinh.rathod@kpit.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> References: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> X-ClientProxiedBy: PN2PR01CA0120.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:27::35) To PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: ba63420c-c92c-4252-5e92-08da5b3ac5b1 X-MS-TrafficTypeDiagnostic: PN3PR01MB6983:EE_ X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230016)(4636009)(366004)(376002)(136003)(39860400002)(346002)(396003)(6666004)(41300700001)(2906002)(86362001)(1076003)(2616005)(5660300002)(6486002)(186003)(6512007)(478600001)(6506007)(8936002)(107886003)(52116002)(6636002)(38100700002)(316002)(36756003)(8676002)(4326008)(66476007)(83380400001)(66556008)(66574015)(66946007);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: kpit.com X-MS-Exchange-CrossTenant-Network-Message-Id: ba63420c-c92c-4252-5e92-08da5b3ac5b1 X-MS-Exchange-CrossTenant-AuthSource: PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Jul 2022 08:22:01.1825 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3539451e-b46e-4a26-a242-ff61502855c7 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: ynuygVmrrfR/DqNQGmbeB5/d8CZBHZdrG4ns1otgot/JCS9gs3nIyTTNVQI8ZAU0WHLnZILKPLnoaCi36mRkJQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PN3PR01MB6983 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 01 Jul 2022 08:22:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/97651 From: Omkar Patil CVE: CVE-2021-46790 Signed-off-by: Omkar Patil Signed-off-by: Ranjitsinh Rathod --- .../ntfs-3g-ntfsprogs/CVE-2021-46790.patch | 31 +++++++++++++++++++ .../ntfs-3g-ntfsprogs_2021.8.22.bb | 4 ++- 2 files changed, 34 insertions(+), 1 deletion(-) create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2021-46790.patch -- 2.17.1 This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails. diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2021-46790.patch b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2021-46790.patch new file mode 100644 index 000000000..e0bb1b77f --- /dev/null +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2021-46790.patch @@ -0,0 +1,31 @@ +From 96412e28e5c7ac2d15f1cff8c825330bbb60976e Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Jean-Pierre=20Andr=C3=A9?= +Date: Tue, 10 May 2022 10:30:24 +0200 +Subject: [PATCH] Fixed possible out-of-buffer condition in ntfsck + +A bad usa_count could lead to an out-of-buffer condition. Just avoid +the issue and report the error, still not fix it. + +CVE: CVE-2021-46790 +Upstream-Status: Backport [http://archive.ubuntu.com/ubuntu/pool/main/n/ntfs-3g/ntfs-3g_2021.8.22-3ubuntu1.1.debian.tar.xz] +Comment: No change in any hunk +Signed-off-by: Omkar Patil + +--- + ntfsprogs/ntfsck.c | 3 ++- + 1 file changed, 2 insertions(+), 1 deletion(-) + +diff --git a/ntfsprogs/ntfsck.c b/ntfsprogs/ntfsck.c +index d49f3f96..8c126411 100644 +--- a/ntfsprogs/ntfsck.c ++++ b/ntfsprogs/ntfsck.c +@@ -616,7 +616,8 @@ static BOOL check_file_record(u8 *buffer, u16 buflen) + + // Remove update seq & check it. + usa = *(u16*)(buffer+usa_ofs); // The value that should be at the end of every sector. +- assert_u32_equal(usa_count-1, buflen/NTFS_BLOCK_SIZE, "USA length"); ++ if (assert_u32_equal(usa_count-1, buflen/NTFS_BLOCK_SIZE, "USA length")) ++ return (1); + for (i=1;i X-Patchwork-Id: 9727 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D1555CCA47F for ; Fri, 1 Jul 2022 08:22:16 +0000 (UTC) Received: from IND01-BMX-obe.outbound.protection.outlook.com (IND01-BMX-obe.outbound.protection.outlook.com [40.107.239.67]) by mx.groups.io with SMTP id smtpd.web08.35522.1656663731775507795 for ; Fri, 01 Jul 2022 01:22:13 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@kpit.com header.s=selector1 header.b=K1SK/BEx; spf=pass (domain: kpit.com, ip: 40.107.239.67, mailfrom: ranjitsinh.rathod@kpit.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VArJ7Hy01zbOY8Q7GZ2FIjb4pBLrw+YwPULTVjj/XGzMl3LmnNJPRE9jo0y/rpmLUaEB2/vd2LxGSLhuqeDGWzWcQ7CWslWj7czXwW+xTXK4r0kpklHxbNUqoHCPeqSj9L81pO19eYezaq206WUApRiNmPTSd9Gx6LhAjHOCfuF2bPHeo/hvf7HmYYXQ5ReDwxkenR51VpiDf3Uet/aOfTfW8wSwQ2gKpTnivp5U9LC6uXhJAAvo7XMKWDKEj3Y52Z7upkDOduJc6YmX5gggNECgh0lF7DXe2PeXvY4a3XW7kScpjxBUl4KMQpDhpqu9hTFdiuwWwVO6mvvpo+5JDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sg7/PyijWXR4J6bJ3hNQ7//bntiyA+GWbuQ+YKeb6hk=; b=JUvEaNuULatMylpara/0Ee65HI93S5IlDzDyezMP+KP8pbh/jObPJ1YOQwysdvPRJFlfGkFBOurNBPRX7fGnURyZsy3efII0eJBDyJx08B8N+J9Jl0kt/yLyL1t/e8j/bSU+4PBZZiVQEj89WDMka+NI/+BfJEClQvGyHK9Ijjazvbg5ma4W3vk+MRsEPY7VAHgh9g/ZgWzF6KwSYLcJ8ffGo8ZLIADho4KTN1gijFIjG4fO3VLCu42Qs+Vhy2iu/vxxZuMJpY6biFz3QhmS1mrn5R5+GVlcZrOkgaYsHjNZdE6L9V+9S+mmG92UxxcZennO4kHKd2PgKxPRuqz1GQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kpit.com; dmarc=pass action=none header.from=kpit.com; dkim=pass header.d=kpit.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kpit.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sg7/PyijWXR4J6bJ3hNQ7//bntiyA+GWbuQ+YKeb6hk=; b=K1SK/BExTa09botaQeiziFxySIVMxoHtWvt5OJz95CicJ3ZNxusgwON+GUgBAz0xnlENuVEmOAonk5NlD2PXoQVjvqcI1Ts5ebyT8fDIrTbXK+1BtgK9N21UCgQ7LR6TIyppp4wlRXL6FKHu9oIdOxfTsLk5Mkvv+xUWUrG/pNk= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=kpit.com; Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) by BM1PR01MB1044.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:8::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5395.15; Fri, 1 Jul 2022 08:22:03 +0000 Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e]) by PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e%4]) with mapi id 15.20.5395.015; Fri, 1 Jul 2022 08:22:02 +0000 From: Ranjith Rathod To: openembedded-devel@lists.openembedded.org, omkar.patil@kpit.com Cc: Ranjitsinh Rathod Subject: [oe][meta-filesystems][dunfell][PATCH 3/8] ntfs-3g-ntfsprogs: Fix CVE-2022-30783 Date: Fri, 1 Jul 2022 13:50:57 +0530 Message-Id: <20220701082102.17835-4-ranjitsinh.rathod@kpit.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> References: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> X-ClientProxiedBy: PN2PR01CA0120.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:27::35) To PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 3f4757fe-4f68-4a67-b1ad-08da5b3ac6ab X-MS-TrafficTypeDiagnostic: BM1PR01MB1044:EE_ X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230016)(4636009)(136003)(366004)(39860400002)(396003)(376002)(346002)(186003)(66574015)(83380400001)(1076003)(66946007)(316002)(6636002)(6666004)(66556008)(8676002)(86362001)(36756003)(4326008)(6512007)(52116002)(107886003)(5660300002)(8936002)(2616005)(6506007)(66476007)(478600001)(6486002)(41300700001)(2906002)(38100700002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: kpit.com X-MS-Exchange-CrossTenant-Network-Message-Id: 3f4757fe-4f68-4a67-b1ad-08da5b3ac6ab X-MS-Exchange-CrossTenant-AuthSource: PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Jul 2022 08:22:02.8061 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3539451e-b46e-4a26-a242-ff61502855c7 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: p8a2XCmKkOUmaqIND9w0qtzEPLhOtaka8HihUpgNYR+z8tBj0MDp/9TERjC0/uS0xdn/gJbkv99HgT1NvXAN7g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BM1PR01MB1044 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 01 Jul 2022 08:22:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/97655 From: Omkar Patil CVE: CVE-2022-30783 Signed-off-by: Omkar Patil Signed-off-by: Ranjitsinh Rathod --- .../ntfs-3g-ntfsprogs/CVE-2022-30783.patch | 75 +++++++++++++++++++ .../ntfs-3g-ntfsprogs_2021.8.22.bb | 1 + 2 files changed, 76 insertions(+) create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30783.patch -- 2.17.1 This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails. diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30783.patch b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30783.patch new file mode 100644 index 000000000..41f26503e --- /dev/null +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30783.patch @@ -0,0 +1,75 @@ +From 7f81935f32e58e8fec22bc46683b1b067469405f Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Jean-Pierre=20Andr=C3=A9?= +Date: Tue, 10 May 2022 10:44:34 +0200 +Subject: [PATCH] Returned an error code when the --help or --version options + are used + +Accepting --help or --version options may leave the ntfs-3g process in an +unclean state, so reject them while processing options. Also reject +them in libfuse-lite. + +CVE: CVE-2022-30783 +Upstream-Status: Backport [http://archive.ubuntu.com/ubuntu/pool/main/n/ntfs-3g/ntfs-3g_2021.8.22-3ubuntu1.1.debian.tar.xz] +Comment: No change in any hunk +Signed-off-by: Omkar Patil + +--- + libfuse-lite/mount.c | 3 +-- + src/ntfs-3g_common.c | 6 ++++++ + src/ntfs-3g_common.h | 2 ++ + 3 files changed, 9 insertions(+), 2 deletions(-) + +diff --git a/libfuse-lite/mount.c b/libfuse-lite/mount.c +index 64adee7d..6ae29d8c 100644 +--- a/libfuse-lite/mount.c ++++ b/libfuse-lite/mount.c +@@ -670,11 +670,10 @@ int fuse_kern_mount(const char *mountpoint, struct fuse_args *args) + fprintf(stderr, "fuse: 'allow_other' and 'allow_root' options are mutually exclusive\n"); + goto out; + } +- res = 0; ++ res = -1; + if (mo.ishelp) + goto out; + +- res = -1; + if (get_mnt_flag_opts(&mnt_opts, mo.flags) == -1) + goto out; + #ifndef __SOLARIS__ +diff --git a/src/ntfs-3g_common.c b/src/ntfs-3g_common.c +index 7e3e93d2..29021dfc 100644 +--- a/src/ntfs-3g_common.c ++++ b/src/ntfs-3g_common.c +@@ -128,6 +128,10 @@ const struct DEFOPTION optionlist[] = { + { "efs_raw", OPT_EFS_RAW, FLGOPT_BOGUS }, + { "posix_nlink", OPT_POSIX_NLINK, FLGOPT_BOGUS }, + { "special_files", OPT_SPECIAL_FILES, FLGOPT_STRING }, ++ { "--help", OPT_HELP, FLGOPT_BOGUS }, ++ { "-h", OPT_HELP, FLGOPT_BOGUS }, ++ { "--version", OPT_VERSION, FLGOPT_BOGUS }, ++ { "-V", OPT_VERSION, FLGOPT_BOGUS }, + { (const char*)NULL, 0, 0 } /* end marker */ + } ; + +@@ -521,6 +525,8 @@ char *parse_mount_options(ntfs_fuse_context_t *ctx, + * mounted or not. + * (falling through to default) + */ ++ case OPT_HELP : /* Could lead to unclean condition */ ++ case OPT_VERSION : /* Could lead to unclean condition */ + default : + ntfs_log_error("'%s' is an unsupported option.\n", + poptl->name); +diff --git a/src/ntfs-3g_common.h b/src/ntfs-3g_common.h +index 4ed256a3..8ead5107 100644 +--- a/src/ntfs-3g_common.h ++++ b/src/ntfs-3g_common.h +@@ -94,6 +94,8 @@ enum { + OPT_EFS_RAW, + OPT_POSIX_NLINK, + OPT_SPECIAL_FILES, ++ OPT_HELP, ++ OPT_VERSION, + } ; + + /* Option flags */ diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb index ca8af163e..ccd18f86c 100644 --- a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb @@ -9,6 +9,7 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=59530bdf33659b29e73d4adb9f9f6552 \ SRC_URI = "http://tuxera.com/opensource/ntfs-3g_ntfsprogs-${PV}.tgz \ file://0001-libntfs-3g-Makefile.am-fix-install-failed-while-host.patch \ file://CVE-2021-46790.patch \ + file://CVE-2022-30783.patch \ " S = "${WORKDIR}/ntfs-3g_ntfsprogs-${PV}" From patchwork Fri Jul 1 08:20:58 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ranjitsinh Rathod X-Patchwork-Id: 9729 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id DF48FCCA483 for ; Fri, 1 Jul 2022 08:22:16 +0000 (UTC) Received: from IND01-BMX-obe.outbound.protection.outlook.com (IND01-BMX-obe.outbound.protection.outlook.com [40.107.239.67]) by mx.groups.io with SMTP id smtpd.web08.35522.1656663731775507795 for ; Fri, 01 Jul 2022 01:22:12 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@kpit.com header.s=selector1 header.b=GZb4CmtL; spf=pass (domain: kpit.com, ip: 40.107.239.67, mailfrom: ranjitsinh.rathod@kpit.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=itnyAKTiUMedEfZwoT2Y8Epyo3TKXD98qiSG7Wfz1S975iJCfRXl/DoKVPze3E4RVrUpImoWzQHODbvLSsVLJct7ILa/yktEwQ/Zfzri8xiXMqCXxceMKoeL9gWOW2sX2urJleKIK3UM/OMN1ov1OF/ek8GShAu8aMyJ3FZ9F/Ow+CQRoq61AwYMCp0Jn20P3Yuob0WcNCIiKqu4gQYYyRnfojbxBmRayvfllPmqw6mC3s4643ODmmWxHkyPO1HNEQ1nhvwyCpZ2tvY9LcKCTIE/23ETRTVjHSFQSfaponGUc6Fb+ishQ9gqrpl9kPMmDZGuS1IoT+rsURZu83sLaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NEkRju/UjyBkYYsXgjphrRCxZzI993CiZ4Ly0r0y3NU=; b=G+bp8MZMrv5gii1DFc0nY2NOTYRSzyP2cwh8m0X/vGu4vIIe2TY4RXXceWwTOJkolxfhKChRZojBXtFCPwD1rbLIxiG5nnisY4PpQRb3WfkD7i4HtJvmcE6GR6h8MiMIkmLCciJUoDrNhGBt+mpioOwRQ6980xYH6syUVlHLh/wtaoy+Yg0z2VB5y2JfecT5p/zw4jEK+jnJyuqcknVcZ9a5ApeO/xo0njfxKj/47JqEzMgQ8nbg4mlAXmLbFJuZiGpB65LwS17oLj1sTs6IdvBeN2P7LaZkKz3DfxheX7gg1jI7Ks0C/h8ScGMddhcRrvwTBwyOUdopgrBS3ECmlQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kpit.com; dmarc=pass action=none header.from=kpit.com; dkim=pass header.d=kpit.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kpit.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NEkRju/UjyBkYYsXgjphrRCxZzI993CiZ4Ly0r0y3NU=; b=GZb4CmtLOFUHnqLkfWBr5WWc3yZ/DJpw9PNdTjrNOJkfMPist3eKDm5j7MxsRTutaPAdgYyJid9GY0dFXF9kq3DVeH4Y7WGRBlBKImYSq0SJYbfD3gyuLxC8y9YnuuDoNdkQVs4KMJ6xFyPWoSIWPzqDBwrXcTC+dgxBx1kkWtc= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=kpit.com; Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) by BM1PR01MB1044.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:8::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5395.15; Fri, 1 Jul 2022 08:22:04 +0000 Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e]) by PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e%4]) with mapi id 15.20.5395.015; Fri, 1 Jul 2022 08:22:04 +0000 From: Ranjith Rathod To: openembedded-devel@lists.openembedded.org, omkar.patil@kpit.com Cc: Ranjitsinh Rathod Subject: [oe][meta-filesystems][dunfell][PATCH 4/8] ntfs-3g-ntfsprogs: Fix CVE-2022-30784 Date: Fri, 1 Jul 2022 13:50:58 +0530 Message-Id: <20220701082102.17835-5-ranjitsinh.rathod@kpit.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> References: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> X-ClientProxiedBy: PN2PR01CA0120.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:27::35) To PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 193ad282-7776-40c3-e55b-08da5b3ac790 X-MS-TrafficTypeDiagnostic: BM1PR01MB1044:EE_ X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230016)(4636009)(136003)(366004)(39860400002)(396003)(376002)(346002)(186003)(66574015)(83380400001)(1076003)(66946007)(316002)(6636002)(6666004)(66556008)(8676002)(86362001)(36756003)(4326008)(6512007)(52116002)(107886003)(5660300002)(8936002)(2616005)(6506007)(66476007)(478600001)(6486002)(41300700001)(2906002)(38100700002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: kpit.com X-MS-Exchange-CrossTenant-Network-Message-Id: 193ad282-7776-40c3-e55b-08da5b3ac790 X-MS-Exchange-CrossTenant-AuthSource: PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Jul 2022 08:22:04.3707 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3539451e-b46e-4a26-a242-ff61502855c7 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: uRcG2ggCxg5QoyMFIatqKuvEus8T3WqjTsQrH2zUIRuhmjvffQHrvGiaSU2GsipELaJ6mXOZtPq4GMPcjx5OhQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BM1PR01MB1044 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 01 Jul 2022 08:22:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/97654 From: Omkar Patil CVE: CVE-2022-30784 Signed-off-by: Omkar Patil Signed-off-by: Ranjitsinh Rathod --- .../ntfs-3g-ntfsprogs/CVE-2022-30784.patch | 74 +++++++++++++++++++ .../ntfs-3g-ntfsprogs_2021.8.22.bb | 1 + 2 files changed, 75 insertions(+) create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30784.patch -- 2.17.1 This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails. diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30784.patch b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30784.patch new file mode 100644 index 000000000..ff4ee6df0 --- /dev/null +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30784.patch @@ -0,0 +1,74 @@ +From 60717a846deaaea47e50ce58872869f7bd1103b5 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Jean-Pierre=20Andr=C3=A9?= +Date: Tue, 21 Sep 2021 10:56:06 +0200 +Subject: [PATCH] Avoided allocating and reading an attribute beyond its full + size + +Before reading a full attribute value for internal use, its expected +length has been checked to be < 0x40000. However the allocated size +in the runlist may be much bigger as a consequence of a bug or malice. +To prevent malloc'ing excessive size, restrict the size of the last +run to read to the needed length. + +CVE: CVE-2022-30784 +Upstream-Status: Backport [http://archive.ubuntu.com/ubuntu/pool/main/n/ntfs-3g/ntfs-3g_2021.8.22-3ubuntu1.1.debian.tar.xz] +Comment: No change in any hunk +Signed-off-by: Omkar Patil + +--- + libntfs-3g/attrib.c | 24 ++++++++++++++++++------ + 1 file changed, 18 insertions(+), 6 deletions(-) + +diff --git a/libntfs-3g/attrib.c b/libntfs-3g/attrib.c +index 00bfca84..51c8536f 100644 +--- a/libntfs-3g/attrib.c ++++ b/libntfs-3g/attrib.c +@@ -216,6 +216,7 @@ s64 ntfs_get_attribute_value(const ntfs_volume *vol, + if (total + (rl[i].length << vol->cluster_size_bits) >= + sle64_to_cpu(a->data_size)) { + unsigned char *intbuf = NULL; ++ s64 intlth; + /* + * We have reached the last run so we were going to + * overflow when executing the ntfs_pread() which is +@@ -229,8 +230,18 @@ s64 ntfs_get_attribute_value(const ntfs_volume *vol, + * We have reached the end of data size so we were + * going to overflow in the same fashion. + * Temporary fix: same as above. ++ * ++ * For safety, limit the amount to read to the ++ * needed size, knowing that the whole attribute ++ * size has been checked to be <= 0x40000. + */ +- intbuf = ntfs_malloc(rl[i].length << vol->cluster_size_bits); ++ intlth = (sle64_to_cpu(a->data_size) - total ++ + vol->cluster_size - 1) ++ >> vol->cluster_size_bits; ++ if (rl[i].length < intlth) ++ intlth = rl[i].length; ++ intbuf = (u8*)ntfs_malloc(intlth ++ << vol->cluster_size_bits); + if (!intbuf) { + free(rl); + return 0; +@@ -246,14 +257,15 @@ s64 ntfs_get_attribute_value(const ntfs_volume *vol, + * - Yes we can, in sparse files! But not necessarily + * size of 16, just run length. + */ +- r = ntfs_pread(vol->dev, rl[i].lcn << +- vol->cluster_size_bits, rl[i].length << +- vol->cluster_size_bits, intbuf); +- if (r != rl[i].length << vol->cluster_size_bits) { ++ r = ntfs_pread(vol->dev, ++ rl[i].lcn << vol->cluster_size_bits, ++ intlth << vol->cluster_size_bits, ++ intbuf); ++ if (r != intlth << vol->cluster_size_bits) { + #define ESTR "Error reading attribute value" + if (r == -1) + ntfs_log_perror(ESTR); +- else if (r < rl[i].length << ++ else if (r < intlth << + vol->cluster_size_bits) { + ntfs_log_debug(ESTR ": Ran out of input data.\n"); + errno = EIO; diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb index ccd18f86c..9e233e127 100644 --- a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb @@ -10,6 +10,7 @@ SRC_URI = "http://tuxera.com/opensource/ntfs-3g_ntfsprogs-${PV}.tgz \ file://0001-libntfs-3g-Makefile.am-fix-install-failed-while-host.patch \ file://CVE-2021-46790.patch \ file://CVE-2022-30783.patch \ + file://CVE-2022-30784.patch \ " S = "${WORKDIR}/ntfs-3g_ntfsprogs-${PV}" From patchwork Fri Jul 1 08:20:59 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ranjitsinh Rathod X-Patchwork-Id: 9728 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id D4013C433EF for ; Fri, 1 Jul 2022 08:22:16 +0000 (UTC) Received: from IND01-BMX-obe.outbound.protection.outlook.com (IND01-BMX-obe.outbound.protection.outlook.com [40.107.239.67]) by mx.groups.io with SMTP id smtpd.web08.35522.1656663731775507795 for ; Fri, 01 Jul 2022 01:22:14 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@kpit.com header.s=selector1 header.b=gytbYcmS; spf=pass (domain: kpit.com, ip: 40.107.239.67, mailfrom: ranjitsinh.rathod@kpit.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=YBB9Prl7dqGPXiKaQNwebkumDRo+78oi9fwSosCn6YOkD8v+XOuWtfUGaP9p3V7t/aXyntMNN/xpNRCymS35Z2+KllQmFyxhdr2oSt5yrREds24WADR8bcBjDw7zbM9jG9DiPz8ut2LHX/FoTJmQDFqNnJJ2YYq2xMzTMI2CcDi1L1NttH0QKnRopHlD9WIM0WHSSxJJBPfEPJCRv6egZab8LqyDPXUJi7X//nAeR36w2uGFL7dAr6ZtecbC4wZTEeGxXgBMXJ5qfLFAzJO6IzOOhCP8pnUTiox/6aagagX74gTHkEoYHVgJdW3hLQYZKr3/SWeJ+/Ps5H5ztAlptg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=C6rJVDMBSj49NUcvYNPIToVQYNO+mZnK3SrFVIdsHPQ=; b=KWWxOsV+MwdE0uHxbbBoGnBd/JQu5A4PQX6uKkVZaBQVt8V0ODhuNdrcwBHEk5gQtXeplIqbGXhgLhN914PEEwVIe0UdqnQHOTpY+vfqYkompKdeSBlkm0G7spMA0neiKlBg1BJGI2MCkdZz037aPnTlqzQLtHZOAwa11qhdt/aTyWvBjk7g6j09FpRqV0d4iKiZFm+MCvWniNAWlJXQGjeTDsOrxr5X8IF/suO7xj8WPnIj3Yv9lBN+OHzpHCTgTi8+6aaB+sG/wUfPOcZMJRG1EwVjzFBlaVDHr5Iira/tClgin4JQXsNTSnpSgI+aAcYtyEbYCj1LUN1RDCGbDQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kpit.com; dmarc=pass action=none header.from=kpit.com; dkim=pass header.d=kpit.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kpit.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=C6rJVDMBSj49NUcvYNPIToVQYNO+mZnK3SrFVIdsHPQ=; b=gytbYcmSAgIo5PqD2QS+Q20F8nbwt7VM2NSauXC9UOCQ15yPSJ0MXPEfnsIhYrUMRtvH37LZlom4Dmdz588socguoYjuQVCSHUFxoSsw2QKli87CZNFSqybDmUxp9TM/l5GYhXMR0QBwgFPu1Tce2bBt1a6Gj//b6u/IydRWjoA= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=kpit.com; Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) by BM1PR01MB1044.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:8::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5395.15; Fri, 1 Jul 2022 08:22:07 +0000 Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e]) by PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e%4]) with mapi id 15.20.5395.015; Fri, 1 Jul 2022 08:22:07 +0000 From: Ranjith Rathod To: openembedded-devel@lists.openembedded.org, omkar.patil@kpit.com Cc: Ranjitsinh Rathod Subject: [oe][meta-filesystems][dunfell][PATCH 5/8] ntfs-3g-ntfsprogs: Add Patch For Multiple CVE Date: Fri, 1 Jul 2022 13:50:59 +0530 Message-Id: <20220701082102.17835-6-ranjitsinh.rathod@kpit.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> References: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> X-ClientProxiedBy: PN2PR01CA0120.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:27::35) To PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: f42de716-e818-4e2f-9294-08da5b3ac940 X-MS-TrafficTypeDiagnostic: BM1PR01MB1044:EE_ X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230016)(4636009)(136003)(366004)(39860400002)(396003)(376002)(346002)(186003)(66574015)(83380400001)(1076003)(66946007)(316002)(6636002)(6666004)(66556008)(8676002)(86362001)(36756003)(4326008)(6512007)(52116002)(107886003)(5660300002)(8936002)(2616005)(6506007)(66476007)(478600001)(6486002)(41300700001)(2906002)(38100700002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: kpit.com X-MS-Exchange-CrossTenant-Network-Message-Id: f42de716-e818-4e2f-9294-08da5b3ac940 X-MS-Exchange-CrossTenant-AuthSource: PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Jul 2022 08:22:07.1373 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3539451e-b46e-4a26-a242-ff61502855c7 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: cyspS2sv36iYw+WhHJNc8ZMauyNpOQXxwD3noyLeLizpZMvWOrw3nnN2r8lsdVVJNl7I5/roelLkKwraIgLodQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BM1PR01MB1044 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 01 Jul 2022 08:22:16 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/97656 From: Omkar Patil Fixed CVE's: CVE-2022-30785 CVE-2022-30787 Signed-off-by: Omkar Patil Signed-off-by: Ranjitsinh Rathod --- .../CVE-2022-30785_30787.patch | 32 +++++++++++++++++++ .../ntfs-3g-ntfsprogs_2021.8.22.bb | 1 + 2 files changed, 33 insertions(+) create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30785_30787.patch -- 2.17.1 This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails. diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30785_30787.patch b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30785_30787.patch new file mode 100644 index 000000000..ae71e8ccf --- /dev/null +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30785_30787.patch @@ -0,0 +1,32 @@ +From fb28eef6f1c26170566187c1ab7dc913a13ea43c Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Jean-Pierre=20Andr=C3=A9?= +Date: Tue, 10 May 2022 10:48:18 +0200 +Subject: [PATCH] Hardened the checking of directory offset requested by a + readdir + +When asked for the next directory entries, make sure the chunk offset +is within valid values, otherwise return no more entries in chunk. + +CVE: CVE-2022-30785 +CVE: CVE-2022-30787 +Upstream-Status: Backport [http://archive.ubuntu.com/ubuntu/pool/main/n/ntfs-3g/ntfs-3g_2021.8.22-3ubuntu1.1.debian.tar.xz] +Comment: No change in any hunk +Signed-off-by: Omkar Patil + +--- + libfuse-lite/fuse.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/libfuse-lite/fuse.c b/libfuse-lite/fuse.c +index 6f9242b7..3d653e63 100644 +--- a/libfuse-lite/fuse.c ++++ b/libfuse-lite/fuse.c +@@ -2223,7 +2223,7 @@ static void fuse_lib_readdir(fuse_req_t req, fuse_ino_t ino, size_t size, + } + } + if (dh->filled) { +- if (off < dh->len) { ++ if ((off >= 0) && (off < dh->len)) { + if (off + size > dh->len) + size = dh->len - off; + } else diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb index 9e233e127..ea8607e6d 100644 --- a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb @@ -11,6 +11,7 @@ SRC_URI = "http://tuxera.com/opensource/ntfs-3g_ntfsprogs-${PV}.tgz \ file://CVE-2021-46790.patch \ file://CVE-2022-30783.patch \ file://CVE-2022-30784.patch \ + file://CVE-2022-30785_30787.patch \ " S = "${WORKDIR}/ntfs-3g_ntfsprogs-${PV}" From patchwork Fri Jul 1 08:21:00 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ranjitsinh Rathod X-Patchwork-Id: 9733 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BEE38C3F2D4 for ; Fri, 1 Jul 2022 08:22:26 +0000 (UTC) Received: from IND01-BMX-obe.outbound.protection.outlook.com (IND01-BMX-obe.outbound.protection.outlook.com [40.107.239.88]) by mx.groups.io with SMTP id smtpd.web08.35523.1656663738806520300 for ; Fri, 01 Jul 2022 01:22:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@kpit.com header.s=selector1 header.b=onNv1/OD; spf=pass (domain: kpit.com, ip: 40.107.239.88, mailfrom: ranjitsinh.rathod@kpit.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CridyaApnreN0zTXaKQ6LWRfVVhaUlB3ojlmZm1AxF40pjRDTRFmD6F0/KtSE8GaixzFyYs7OtyoxnuUBPmOCdLWwsU4eTCpnZ/djW3W37sRMNcsdJsAW2g4dR2g4XjzMlgObqz/JfA+SfC97VDBvjkq9xfeXqL4vls6hwEmtMEJR5WHOj/kCGgJqI0xB1pGbEIlwBOWKjGKQL3TUeOBcsv8G93scftZ2BQYTDQiyiAC5jSKqR3hjLrkNWBcFSosVSDbPGlG5helALFtx3i+9Kxt38/DO0ojfHxgaMhQe124XuPpcq85M054jCmqI0raQTFKCY2QT85j59KJGYmmqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1h5763+gsj7GhBwEXoqYVbcqBvZXMITmb/CyXLssBi0=; b=ogJgIMZY+YxYYp7pZFFiTZhCMR45lPlPuxNeqQzliPnX+eDdHbqbfmlpDQvNeQ87bFfvU/veLrSO7cwctn5StiP1Fs4yLUZIJdLWe+xBSstiYhiQVqXxalK8mfQOqEyBagKNK903UlqYjAxDwtHVXyNQDulGyE+dnOxED/v2+rZDy2WK8kWMByUgCHcrCZ2JcDze4RAab+b5hB3qX5mfgQnPpy4jNKGo0tzugk1x8AN2aakrFk/g6RpLTZLHvTwjGIaZocSZR7MELQAbGSxLeMCwJiBDN5Q3inioZTf7B4dkJr/2Bgmp3/iPmwhSL84psdY5CNpnKTm8Oji4uAsSOw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kpit.com; dmarc=pass action=none header.from=kpit.com; dkim=pass header.d=kpit.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kpit.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1h5763+gsj7GhBwEXoqYVbcqBvZXMITmb/CyXLssBi0=; b=onNv1/ODOvhiWH63OHRc5XUbfSIMu77Yixw0hN4Zb88QNIk97Ch/bjAyEUCCxv/724MWrOr7eR8GCX2k+EabdUK5GXXAHKS4DWgTyGv1uk65Zq2d+dijCPaORelqUhw4teqdORmvbmwncgac/bLRb7xMm2mln6Gx0lpRvfRFV+s= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=kpit.com; Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) by BM1PR01MB1044.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:8::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5395.15; Fri, 1 Jul 2022 08:22:08 +0000 Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e]) by PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e%4]) with mapi id 15.20.5395.015; Fri, 1 Jul 2022 08:22:08 +0000 From: Ranjith Rathod To: openembedded-devel@lists.openembedded.org, omkar.patil@kpit.com Cc: Ranjitsinh Rathod Subject: [oe][meta-filesystems][dunfell][PATCH 6/8] ntfs-3g-ntfsprogs: Fix CVE-2022-30786 Date: Fri, 1 Jul 2022 13:51:00 +0530 Message-Id: <20220701082102.17835-7-ranjitsinh.rathod@kpit.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> References: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> X-ClientProxiedBy: PN2PR01CA0120.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:27::35) To PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: b3eb96a2-894a-4ed0-ec4a-08da5b3aca23 X-MS-TrafficTypeDiagnostic: BM1PR01MB1044:EE_ X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230016)(4636009)(136003)(366004)(39860400002)(396003)(376002)(346002)(186003)(66574015)(83380400001)(1076003)(66946007)(316002)(6636002)(6666004)(66556008)(8676002)(86362001)(36756003)(4326008)(6512007)(52116002)(107886003)(5660300002)(8936002)(2616005)(6506007)(66476007)(478600001)(6486002)(41300700001)(2906002)(38100700002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: wDj53iTX+7vZ1+6Br55USVReUEJRmgQVOHphjbER6mZFqFFSkKDv6ra6xal6AXFaX8X4Rc7XowTkGW+QSyJMI3YogAn44N2J075rhZeqcmH/CLAvTZzcCfpNiwSEvTyYpzqn764Rbo0MGlvNKZJ6vvQFZQuKIIqyF5nWsvZOv1dQZcAF8ZRP2rXMmCPCFyXr2ZVB3P9tvjl+S2RpbYHQtzDX3cIRDoJIQhvJ1AwPu86NBvmr/SogQHsZrGvEZ9d3mQ/nL3akTMFi+DozapCSu2aM8/C59yIfHIIPLzmCy9M7D6qeN8rrQctWwhkF0Jpn4C9zqwvk81pCdTHrPM2gBqbnwTu0tOBEFVsrNW3e1bVHJpnkbjsYT/lX0L2nXJm/P/tDUUapjmgoREFOq3WA5WzPFNz+BntCCSj+kQStNtT/djDspCC/sNouDi0FOpvKam/ItF38hCFceRAt/O4jzEtizUD/8OTozwgjdiDhljpX0PYke82BLLdfzfBVHjmKW80quUw1myZEU641Ol/ABoffRQWCAp6yYiXiNyIdTpZWyoVmwwUvXSLLGm7eD5yoHlV4myW+bDY3rwuVqOKgZQzP+IbeDLtxArOdrE+wpWwGjOW3XiVpqcQBVPjTSv//F6FzMVdo1C0cGHLD3FDhK+O6xpDBWvA3CeVV3BY7LNBDitRYIUCBhG9qeBFiFwxOvGuVwBxg2CsZ6544IMokcplAhEH0H9m8XCKMez/EQeb1Qcwbc2Ew5ypl5ltfZB33/3WZYJfqb6e1W8zCT2uvqpw9r4ts7sO8IpPh8TioRclraEdpA0ONOtOXP5wEghWEALbukfEfwMSpoRzKHR/9WrC+cPUbdvwY+11eCCeL4SVsNB+EugzgQ05EyLemmkSTXojSTTLNsgr3kuBrQGMHI2MD17rhRSqVstXxCVj1fSiyWOds1X6re072OyCHz9Lhc/mmombiQJ4Ce1leHMgf9dhJyZddskcbuzWf6wePKGxThx4nvLtVBFWNrhqDju8Hpv3aTsXzurm3SCvhktKzN1Zvbewok9N11j2QQh79Kmtx1E23ohU+i2ybbMp4RIA/qNz/B8rvYpyyeVmHHAwkmdbbWNpZkqbbv0tfBfgEOml1vOGqohlZTSt8LJFk3j1aWN8ikHDR2fJ7Jg+lnH2WijPKeg9fFBjaMuMP3Y0EiW2qtuegQnIzEjsoFK0FBnA+tWrr6LIbvn033hF/OI/HvkDkSWUueGudwiQAWTIat7fnSBr60SK5RzvamW8ooCdq+XSTN5Sm8ZYh5EySPe/8MHOvh4RfNuB2bFGkc0Bc3N1l1gseqGn3l96jg2qgOriqfZpPBy1IdZULCuMyBXqAo7W/sB4I0Xyfc5QdiBGaUGLGAj2EAe8aJxqFGAAZOlD3Ts162Psix7l/aXmBsqo6h3jaKI9pm1rblkju6bUdf0shpcz1kg7G3NP3dtmoAry9omPJy8IGuIAK8/OnSTpJdKT/ICkXRP3gH0HUDRBxaFNHl5i+bk24qfi1UC3oXwQG+SGBWUunwChKE7YacBIlO8+pBLpHSC7O1rL/wd4yYH8+yGCOruYCrJSdn1tG+zG8ArW2bFe0NQkGuT10Kwa0pxLRbuazLp4bM+/BpfINRxP7vfW3lwMrS3gKAz3UZ8kS56UGEzu9L3CF4hMOuAVWrA== X-OriginatorOrg: kpit.com X-MS-Exchange-CrossTenant-Network-Message-Id: b3eb96a2-894a-4ed0-ec4a-08da5b3aca23 X-MS-Exchange-CrossTenant-AuthSource: PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Jul 2022 08:22:08.6428 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3539451e-b46e-4a26-a242-ff61502855c7 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: YAKznCSgZFFT+xy9Z/sA0HGAfZ4VBW6fLf0Ozn+E8ksKoqD+NMJiGajeGGibWmcAHgkcXrHMOLSuWqqE6WsSQg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BM1PR01MB1044 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 01 Jul 2022 08:22:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/97659 From: Omkar Patil CVE: CVE-2022-30786 Signed-off-by: Omkar Patil Signed-off-by: Ranjitsinh Rathod --- .../ntfs-3g-ntfsprogs/CVE-2022-30786-1.patch | 36 +++++++++++++++ .../ntfs-3g-ntfsprogs/CVE-2022-30786-2.patch | 45 +++++++++++++++++++ .../ntfs-3g-ntfsprogs_2021.8.22.bb | 2 + 3 files changed, 83 insertions(+) create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30786-1.patch create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30786-2.patch -- 2.17.1 This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails. diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30786-1.patch b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30786-1.patch new file mode 100644 index 000000000..9d485fed8 --- /dev/null +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30786-1.patch @@ -0,0 +1,36 @@ +From 838b6e35b43062353998853eab50cd0675201ed7 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Jean-Pierre=20Andr=C3=A9?= +Date: Tue, 21 Sep 2021 10:54:50 +0200 +Subject: [PATCH] Made sure there is no null character in an attribute name + +When copying an attribute name which contains a null, it is truncated +and this may lead to accessing non-allocated bytes when relying on the +expected name length. Such names must therefore be rejected. + +CVE: CVE-2022-30786 +Upstream-Status: Backport [http://archive.ubuntu.com/ubuntu/pool/main/n/ntfs-3g/ntfs-3g_2021.8.22-3ubuntu1.1.debian.tar.xz] +Comment: No change in any hunk +Signed-off-by: Omkar Patil + +--- + libntfs-3g/attrib.c | 8 ++++++++ + 1 file changed, 8 insertions(+) + +--- a/libntfs-3g/attrib.c ++++ b/libntfs-3g/attrib.c +@@ -426,7 +426,15 @@ ntfs_attr *ntfs_attr_open(ntfs_inode *ni + na = ntfs_calloc(sizeof(ntfs_attr)); + if (!na) + goto out; ++ if (!name_len) ++ name = (ntfschar*)NULL; + if (name && name != AT_UNNAMED && name != NTFS_INDEX_I30) { ++ /* A null char leads to a short name and unallocated bytes */ ++ if (ntfs_ucsnlen(name, name_len) != name_len) { ++ ntfs_log_error("Null character in attribute name" ++ " of inode %lld\n",(long long)ni->mft_no); ++ goto err_out; ++ } + name = ntfs_ucsndup(name, name_len); + if (!name) + goto err_out; diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30786-2.patch b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30786-2.patch new file mode 100644 index 000000000..85a2971b4 --- /dev/null +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30786-2.patch @@ -0,0 +1,45 @@ +From 5ce8941bf47291cd6ffe7cdb1797253f1cc3a86f Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Jean-Pierre=20Andr=C3=A9?= +Date: Fri, 5 Nov 2021 08:41:20 +0100 +Subject: [PATCH] Made sure there is no null character in an attribute name + (bis) + +When copying an attribute name which contains a null, it is truncated +and this may lead to accessing non-allocated bytes when relying on the +expected name length. Such (illegal) names must therefore be rejected. + +CVE: CVE-2022-30786 +Upstream-Status: Backport [http://archive.ubuntu.com/ubuntu/pool/main/n/ntfs-3g/ntfs-3g_2021.8.22-3ubuntu1.1.debian.tar.xz] +Comment: No change in any hunk +Signed-off-by: Omkar Patil + +--- + libntfs-3g/attrib.c | 15 +++++++++++++-- + 1 file changed, 13 insertions(+), 2 deletions(-) + +diff --git a/libntfs-3g/attrib.c b/libntfs-3g/attrib.c +index 51c8536f..efb91943 100644 +--- a/libntfs-3g/attrib.c ++++ b/libntfs-3g/attrib.c +@@ -452,8 +452,19 @@ ntfs_attr *ntfs_attr_open(ntfs_inode *ni, const ATTR_TYPES type, + + if (!name) { + if (a->name_length) { +- name = ntfs_ucsndup((ntfschar*)((u8*)a + le16_to_cpu( +- a->name_offset)), a->name_length); ++ ntfschar *attr_name; ++ ++ attr_name = (ntfschar*)((u8*)a ++ + le16_to_cpu(a->name_offset)); ++ /* A null character leads to illegal memory access */ ++ if (ntfs_ucsnlen(attr_name, a->name_length) ++ != a->name_length) { ++ ntfs_log_error("Null character in attribute" ++ " name in inode %lld\n", ++ (long long)ni->mft_no); ++ goto put_err_out; ++ } ++ name = ntfs_ucsndup(attr_name, a->name_length); + if (!name) + goto put_err_out; + newname = name; diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb index ea8607e6d..f74e91c93 100644 --- a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb @@ -12,6 +12,8 @@ SRC_URI = "http://tuxera.com/opensource/ntfs-3g_ntfsprogs-${PV}.tgz \ file://CVE-2022-30783.patch \ file://CVE-2022-30784.patch \ file://CVE-2022-30785_30787.patch \ + file://CVE-2022-30786-1.patch \ + file://CVE-2022-30786-2.patch \ " S = "${WORKDIR}/ntfs-3g_ntfsprogs-${PV}" From patchwork Fri Jul 1 08:21:01 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ranjitsinh Rathod X-Patchwork-Id: 9734 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id BDEB2CCA479 for ; Fri, 1 Jul 2022 08:22:26 +0000 (UTC) Received: from IND01-BMX-obe.outbound.protection.outlook.com (IND01-BMX-obe.outbound.protection.outlook.com [40.107.239.55]) by mx.groups.io with SMTP id smtpd.web11.35476.1656663739705233754 for ; Fri, 01 Jul 2022 01:22:20 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@kpit.com header.s=selector1 header.b=qdyZ+ajP; spf=pass (domain: kpit.com, ip: 40.107.239.55, mailfrom: ranjitsinh.rathod@kpit.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=nnRnOKZz6KJ2rSX1YQNB7XwM4l5hPMWsL0uy+uo1KASWVon0C4+P1ZBo5FsU/Jo70tdenG0gIz+VQEtyMKaR0yTqDzupr7wEnoGwrwRnUr7G/wkO2RnNCctaQuFDvEI8xAfJGBkmxkGGMyM0UjnH2JlpwJIh5cWwGwOh1n5ZzMjpjUVycwYlyOOGpUmJe2T9IobVUobWzupi1FAHho4d7Hd9CWb6RhDDhofOEokgRsnvbJgBmJtycLMwAMRTBsoupL1ZqMsSHitTYxWuRYaEl+lFTw1ovt5bjxkWVt63gMRiovZoLfqLMrCDu+H88u/wwRO9FTm5SWY6BZ7dU92MPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UDK5rCcmAR/DgIY9m3CMInzUpGifVF9Ma+w0BXsRTHw=; b=KWNOdMtU2knK1z1xOwTN31HNdwYDkfWowdG46x8WNIKg0cn+Xy6SoO9l13k4o3gvSqe+JfFaJ5sxd4dtGFJVwckAwzWB4XZTxFa1pZ0gcEJVJTnZ5fbxjOqsvAvd5KnqQYXp6Lu0pmpkg5BRcT1qvFmZOvGnCRom2sJLrIeCdKJ3cOKIX7ZTe1W8oIika2O++suDfzMKIULJyRHyJGeLFxIoome45ncu3NBFs0NDPcR2Wv2yWlVBEAg4bL3R+q1ejzewhQXayxFzYMqjFq+/IftfVSuoMeKutT9RWDIFvkIEeprpk+eglUpf7c4OqPwKBubbE80MBwnM0anrOGsGdw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kpit.com; dmarc=pass action=none header.from=kpit.com; dkim=pass header.d=kpit.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kpit.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UDK5rCcmAR/DgIY9m3CMInzUpGifVF9Ma+w0BXsRTHw=; b=qdyZ+ajP9OGrPhsdX6FmT2r7cSdwLkE0O6Ex/HRAFSv0hT5J8QKDUZmFPIcUTazgh2PJlf6CbwjdaRTbEhUSw959HzA/e9Gv2WfhYn8wwa6GjTWuq3pqeg3WYLZO0F3jQYYc/Q9Ysst9jYEhclONnKe4TbCIUZvYmwCeUh42ahc= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=kpit.com; Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) by MA1PR0101MB1190.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:24::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5373.18; Fri, 1 Jul 2022 08:22:10 +0000 Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e]) by PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e%4]) with mapi id 15.20.5395.015; Fri, 1 Jul 2022 08:22:10 +0000 From: Ranjith Rathod To: openembedded-devel@lists.openembedded.org, omkar.patil@kpit.com Cc: Ranjitsinh Rathod Subject: [oe][meta-filesystems][dunfell][PATCH 7/8] ntfs-3g-ntfsprogs: Fix CVE-2022-30788 Date: Fri, 1 Jul 2022 13:51:01 +0530 Message-Id: <20220701082102.17835-8-ranjitsinh.rathod@kpit.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> References: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> X-ClientProxiedBy: PN2PR01CA0120.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:27::35) To PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: bd278f43-7eb9-4dff-f049-08da5b3acb46 X-MS-TrafficTypeDiagnostic: MA1PR0101MB1190:EE_ X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: BSBI/ClNGKD+GA4xQhXATWA+FJeOaT4mnvDMv8ajlUJe29a7wvfWudVFixPh6ecxcznXEl8z0sdk7/B301Wz4ew7sLJtNxNtEnelkVNUgNNqt6LMXXKAoFkAda4lNcOk2/5OZ71ALjUE3K05T+Ud/gxvtCNtt50NIeKMbdxW/TrdWjIYbKDp9fQHn8/pB7ZI3Bv2XjEzLGWumBAcf+RZaPHOSZb2c5umpfPJaHCFNv4matxmibyeU83CW9ZQZFFgppD46hkP8BKXkEDGABmKVSXUIjRNS3HoWdp1O3tv2ajk9v43HIwG2Tr7DAjvFVqOxW53YRM6VAeE0VXufJVZ5j96kYasg91NiZ9rrinl3gkGRew4e6TthArU/rTceqBMTom/7XUe2BzSr2Y0T9YZXdazt9tmPBqcsz1jNeYXG+UAklugWQ9gk9mSyCB5fosI/oRvt/T6JS29J5J6yi9Yn/bQEXZalDSX7zTGbNxjNpnSLyRpE1A+vOEadpLm/dIleI8TP5MzeFQO48C7ttJ/SZBohXPaN1mkDftq+75kzjGeYe2qbaxJXVY+db//HY4YeqajmUxzWRfaBoF22NkphSvrYuZnhQO9PtwFtWu5Q8of1MgL0lMgEWnabBDRUkTQwBLeR29H82lG78S7Y6Ow1c4pstQfOjhH7yFhY0GjEL+P4BRat3uPQ2OvIfx0oaqVqMXk4/TrZcj3CRBybN617WPlreAMqVZovRhqZZ9dO2tv1HvuD0MQCHxSSjMcxuWcUBW7IdDK2IkfJ0uhZlScDOjF3FLKcZT1p1/pgrcbPTiE4KVfDcHGwprxNsOj0buTtwtuiPaBprD+NzPVRUGgpQ== X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230016)(4636009)(376002)(366004)(39860400002)(396003)(136003)(346002)(6666004)(2906002)(6506007)(2616005)(107886003)(41300700001)(83380400001)(52116002)(66574015)(1076003)(36756003)(6512007)(4326008)(66476007)(6486002)(8936002)(66556008)(478600001)(86362001)(6636002)(8676002)(5660300002)(38100700002)(186003)(316002)(66946007)(2004002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: kpit.com X-MS-Exchange-CrossTenant-Network-Message-Id: bd278f43-7eb9-4dff-f049-08da5b3acb46 X-MS-Exchange-CrossTenant-AuthSource: PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Jul 2022 08:22:10.5032 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3539451e-b46e-4a26-a242-ff61502855c7 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: aspIr9sQkTdpTYR4fQVl9jZn68PUojFRTja3T0Z5zByYBVavI/BTofp6xP58Yvd6gIwN895Eezk3Hjw03U9M2A== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MA1PR0101MB1190 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 01 Jul 2022 08:22:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/97658 From: Omkar Patil CVE: CVE-2022-30788 Signed-off-by: Omkar Patil Signed-off-by: Ranjitsinh Rathod --- .../ntfs-3g-ntfsprogs/CVE-2022-30788-1.patch | 51 +++++++++++++++++++ .../ntfs-3g-ntfsprogs/CVE-2022-30788-2.patch | 30 +++++++++++ .../ntfs-3g-ntfsprogs_2021.8.22.bb | 2 + 3 files changed, 83 insertions(+) create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30788-1.patch create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30788-2.patch -- 2.17.1 This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails. diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30788-1.patch b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30788-1.patch new file mode 100644 index 000000000..fc10af53f --- /dev/null +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30788-1.patch @@ -0,0 +1,51 @@ +From a8818cf779d3a32f2f52337c6f258c16719625a3 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Jean-Pierre=20Andr=C3=A9?= +Date: Tue, 21 Sep 2021 10:53:16 +0200 +Subject: [PATCH] Used a default usn when the former one cannot be retrieved + +When creating a new MFT record, the former seq_no and usn are retrieved +to avoid the new one to be mistaken for the former one. +This may not be possible when the record is used for the first time +or after some bad error. In such situation use default values. + +CVE: CVE-2022-30788 +Upstream-Status: Backport [http://archive.ubuntu.com/ubuntu/pool/main/n/ntfs-3g/ntfs-3g_2021.8.22-3ubuntu1.1.debian.tar.xz] +Comment: No change in any hunk +Signed-off-by: Omkar Patil + +--- + libntfs-3g/mft.c | 13 +++++++++++-- + 1 file changed, 11 insertions(+), 2 deletions(-) + +diff --git a/libntfs-3g/mft.c b/libntfs-3g/mft.c +index d0a601ff..5052d1ec 100644 +--- a/libntfs-3g/mft.c ++++ b/libntfs-3g/mft.c +@@ -5,7 +5,7 @@ + * Copyright (c) 2004-2005 Richard Russon + * Copyright (c) 2004-2008 Szabolcs Szakacsits + * Copyright (c) 2005 Yura Pakhuchiy +- * Copyright (c) 2014-2018 Jean-Pierre Andre ++ * Copyright (c) 2014-2021 Jean-Pierre Andre + * + * This program/include file is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License as published +@@ -1529,8 +1529,17 @@ ntfs_inode *ntfs_mft_rec_alloc(ntfs_volume *vol, BOOL mft_data) + goto undo_mftbmp_alloc; + } + ++ /* ++ * Retrieve the former seq_no and usn so that the new record ++ * cannot be mistaken for the former one. ++ * However the original record may just be garbage, so ++ * use some sensible value when they cannot be retrieved. ++ */ + seq_no = m->sequence_number; +- usn = *(le16*)((u8*)m + le16_to_cpu(m->usa_ofs)); ++ if (le16_to_cpu(m->usa_ofs) <= (NTFS_BLOCK_SIZE - 2)) ++ usn = *(le16*)((u8*)m + le16_to_cpu(m->usa_ofs & -2)); ++ else ++ usn = const_cpu_to_le16(1); + if (ntfs_mft_record_layout(vol, bit, m)) { + ntfs_log_error("Failed to re-format mft record.\n"); + free(m); diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30788-2.patch b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30788-2.patch new file mode 100644 index 000000000..4759296a2 --- /dev/null +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30788-2.patch @@ -0,0 +1,30 @@ +From bce5734a757fd59d70a52f4d4fe9abe260629b3a Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Jean-Pierre=20Andr=C3=A9?= +Date: Tue, 10 May 2022 10:40:17 +0200 +Subject: [PATCH] Fixed operation on little endian data + +Forcing an even usa_of, in a recent security patch, must be made on cpu +endian data. + +CVE: CVE-2022-30788 +Upstream-Status: Backport [http://archive.ubuntu.com/ubuntu/pool/main/n/ntfs-3g/ntfs-3g_2021.8.22-3ubuntu1.1.debian.tar.xz] +Comment: No change in any hunk +Signed-off-by: Omkar Patil + +--- + libntfs-3g/mft.c | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/libntfs-3g/mft.c b/libntfs-3g/mft.c +index 5052d1ec..aefbb5f1 100644 +--- a/libntfs-3g/mft.c ++++ b/libntfs-3g/mft.c +@@ -1537,7 +1537,7 @@ ntfs_inode *ntfs_mft_rec_alloc(ntfs_volume *vol, BOOL mft_data) + */ + seq_no = m->sequence_number; + if (le16_to_cpu(m->usa_ofs) <= (NTFS_BLOCK_SIZE - 2)) +- usn = *(le16*)((u8*)m + le16_to_cpu(m->usa_ofs & -2)); ++ usn = *(le16*)((u8*)m + (le16_to_cpu(m->usa_ofs) & -2)); + else + usn = const_cpu_to_le16(1); + if (ntfs_mft_record_layout(vol, bit, m)) { diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb index f74e91c93..0da80f8ff 100644 --- a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb @@ -14,6 +14,8 @@ SRC_URI = "http://tuxera.com/opensource/ntfs-3g_ntfsprogs-${PV}.tgz \ file://CVE-2022-30785_30787.patch \ file://CVE-2022-30786-1.patch \ file://CVE-2022-30786-2.patch \ + file://CVE-2022-30788-1.patch \ + file://CVE-2022-30788-2.patch \ " S = "${WORKDIR}/ntfs-3g_ntfsprogs-${PV}" From patchwork Fri Jul 1 08:21:02 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ranjitsinh Rathod X-Patchwork-Id: 9732 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id B9C31C43334 for ; Fri, 1 Jul 2022 08:22:26 +0000 (UTC) Received: from IND01-BMX-obe.outbound.protection.outlook.com (IND01-BMX-obe.outbound.protection.outlook.com [40.107.239.88]) by mx.groups.io with SMTP id smtpd.web08.35523.1656663738806520300 for ; Fri, 01 Jul 2022 01:22:19 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@kpit.com header.s=selector1 header.b=pHzzL52S; spf=pass (domain: kpit.com, ip: 40.107.239.88, mailfrom: ranjitsinh.rathod@kpit.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UCzwp+GeZiHK+73Y72q/2gmPGYGH4FwrqEoVNfrywgXsoc3TrLezmXvpeGLBcnIKYcqOj3+T+yx+qQeuehmx81k6uIPYVx2qnzqA0tkWEvGNEYRGTBum3FgZc7WrqwAQl6WdhS3bM75iGXm1Eb7Bw3QregnPTLMFm5P9NYAx6BcQI748EGm4U4/yhsYn/dTGWVU1Fuy1yRh6CHKk97h+DoRENXzkl7ESevPzfU51jFGKUp1TieJsRtEioiSrrJcTYiFa5ezGl0cwmzThcOQhlUNs6PpIYfLEgIKtyCEpMHy2g3QPo5pQ7DUmF7mYN9ffdpTiKkWJP/Y846UlxMCmiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=5yex/WrEXNAw4j8zPRFVD4rQ4Sjs1pCMM2YKxPJud1w=; b=VKkb4fs+urH7S1CxUtAbMqBm22iMz6sLPaVwcH7yJVYdW67HUIH9ZlXBK7pXbKnWdpGsWbBjwU47D0eDAwjX8K/bXbJ3djEKSG5o4OoX3dLnCeZPD1qo0QPvyzs/4T2ctYKu2ArvWlf4lGGXE1LpvnhU6k4R+dCM+f4uDxZxlUCVrZ/fqPxquH4srXoLkBsUTPDlr3sqLRRJnhUxcI7bpurLv/Iqrg7vZPAfaeJBHsTwKa9QW7kE6bxZk16ZOGwdntHfAEeM1aqG8pJEw4B40b/eU9XQkAx5udk2vS8Jvn1lmGUn8X/Putx4m2L1x4fXBCMRgbsvcnF5pm0XR6vQgg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=kpit.com; dmarc=pass action=none header.from=kpit.com; dkim=pass header.d=kpit.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kpit.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=5yex/WrEXNAw4j8zPRFVD4rQ4Sjs1pCMM2YKxPJud1w=; b=pHzzL52SeqfYbj4LvG1iwyeiUNNt38sxkrjXnCjOXKFVber2j6N674qpNxdMctoWpQLUW6Yo4kc+kFo3uagIVAdf74Ou0+dpNtv0SfjwsNC3ObwDpcz7ENdqDmKVQVrFi++Mkh7CzRY0NZz2Zm9E9MDpZD22mrXLupWoKuQDTAY= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=kpit.com; Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) by BM1PR01MB1044.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:8::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5395.15; Fri, 1 Jul 2022 08:22:12 +0000 Received: from PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e]) by PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM ([fe80::c183:fc86:d69b:a1e%4]) with mapi id 15.20.5395.015; Fri, 1 Jul 2022 08:22:12 +0000 From: Ranjith Rathod To: openembedded-devel@lists.openembedded.org, omkar.patil@kpit.com Cc: Ranjitsinh Rathod Subject: [oe][meta-filesystems][dunfell][PATCH 8/8] ntfs-3g-ntfsprogs: Fix CVE-2022-30789 Date: Fri, 1 Jul 2022 13:51:02 +0530 Message-Id: <20220701082102.17835-9-ranjitsinh.rathod@kpit.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> References: <20220701082102.17835-1-ranjitsinh.rathod@kpit.com> X-ClientProxiedBy: PN2PR01CA0120.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:27::35) To PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:8d::14) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 224ead6a-e06f-4d85-84d9-08da5b3acc16 X-MS-TrafficTypeDiagnostic: BM1PR01MB1044:EE_ X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230016)(4636009)(136003)(366004)(39860400002)(396003)(376002)(346002)(186003)(66574015)(83380400001)(1076003)(66946007)(316002)(6636002)(6666004)(66556008)(8676002)(86362001)(36756003)(4326008)(6512007)(52116002)(107886003)(5660300002)(8936002)(2616005)(6506007)(66476007)(478600001)(6486002)(41300700001)(2906002)(38100700002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: Rz3DKX//sbBiEJ68Sqf78yhn5Q/iRiG0Cjd2Pj90jMjaxn7pr7bAgjAE5ebPCHSBRAs9MHZSULvnh9pt5yHfwcHa1uKS73eIFwopJw43Nt5xRpAkQftFGdUtHlM+dEGBCyuFabF4AGV6vt6JLVomiaLCNqFVy53wMMHuL/Hv2kueraJIbsUMX2x9P4OeSQj8+3hRN883mLAI4R87R9LH4V7pt8AjYQYSwIjst4Zz3JzbBwn/I+jzSGZeX+K7I5FjgqNHbsJk+N9oNxuUqLMsBhdGjvuhVyP3jZYMuo6agYn/TlS6qawwOsEF9NknmnlyeUORqdH0OrIy3tC9vNg0+SCO1RmEVc635nkOztrII06oro6VCumtG49qs7r5Hi2VqLTfEevkxo3g6E1g90sW1m8i6areJHnMEv1KiNkIVrYvAk+tr5WPqtXmgGN2kueZG+5ZEgwvTIxWfAV0X0qv01L1j+EJkOQogGkTGuR6x+U1pHh/FGI8u1q4sAeoA7u0Ix71v/WcLeJ1fdIKIo9wT98qv5BVrD8Y+OuqLu1jlpva5OiB9wWlNNvODbGQRjTiDrxBuDodh0z5U3YhRCefFbF+iuB0Apb+u8qbMloYH+LXx7uRELCHWvI1J0GZCgsMFzMQUxERq0WFR9VyagboYQxmEs1Y6pwEh+ZYW4b4yGPKDTatDOfGNVErGU7WnfH0Fo0DNdf7UvsR2CfrAAD5T2usVKv45p1IddhTkKco1rOy3zSP9BAK65x028nBOlp/MYU0UmpPsXFEX4egQRg84jtattUQRmuMmcUVQszOsqb2hJXUpPvBwD90mMvUeH6A7Wp0DShpor2yFCpO1Ufijtm8NkEh7Tg2fsTo6I/pzJB2yItBJLG/CUn0kSsTJE5bvaHRMY7W3ZinQcOUodUQdEwWDBwyBsZkFMNoKnZH2XQn8xwqrSmMNazvl+SyRPhAELyr0407foa4EJEk0QlcoDl92T2N+evTyr4ynRu4qFWj4dnBY3nhtcRpmBZMUx0G3iHRyUqGDSQNhEeCCqtTCQ3ag0KnStXdbGQiuNwkS/pEhEOQE9mr+w8+eAGgoHBRjnl65lgrdn/3hT07/p3+W+EznQOVb8GZ2y/bOWuBG1KgBR2U0Tr4ZGdR7AWvURlSNrgl0o0OPSlbHCGX1Z/1hhJNmpQypZZicq3F39aFNurao4gIuNcjRbfIWm0yIvYGZ0DaIUMPDS4UEJXY2Z7fkWLfIrCJzh7NYrnIoqnSAH8bR9F2MpS+XCwWwCSFuwYxcB/xO0XZ6tQ6sc84qJtnEKhFqjqNlzASwATK9iqePyqnUwfWSFaAYrm8YGUiz/SQA35RcD+HA4E5Psz7s469oYwcmLns+ghTct9LyK+pDReroLd4kLFnsPmTDvCaT3om9CyXN9QxeybzfktkS3RDgOi3nLTmYW2GD3VjU9a687dKyQ2u6fqU0x2wvjGUjL8fTLpv5rlRSJFPFe3xNFM9CXj8MjsaFFPHQsZZ5EWctNNI6OHAt7tVuKcd4pJQryrPs2ejmtYpxIdOx96xsayLsvWSEMufWXUiqCHnE6SwS+FHNrNUezrqFcJvIpQ9MPR2maVUUro6EczL3wuHQlBaGNN3UskbYiZksRV/ra6/5sn7G5qTsCw3INg0TAjX6cugxBdmucIAjlbsirI/EAmJsA== X-OriginatorOrg: kpit.com X-MS-Exchange-CrossTenant-Network-Message-Id: 224ead6a-e06f-4d85-84d9-08da5b3acc16 X-MS-Exchange-CrossTenant-AuthSource: PN3PR01MB7382.INDPRD01.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Jul 2022 08:22:12.0969 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3539451e-b46e-4a26-a242-ff61502855c7 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 3PsnwJq1Wm7Lw6I/kmLAdR3Ju2s5jqrlYQIJDTXrdvgBpkMPi8h74AXpNMnutTAuWp1CAxNpcOHLjMKtVgHElQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BM1PR01MB1044 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Fri, 01 Jul 2022 08:22:26 -0000 X-Groupsio-URL: https://lists.openembedded.org/g/openembedded-devel/message/97657 From: Omkar Patil CVE: CVE-2022-30789 Signed-off-by: Omkar Patil Signed-off-by: Ranjitsinh Rathod --- .../ntfs-3g-ntfsprogs/CVE-2022-30789.patch | 68 +++++++++++++++++++ .../ntfs-3g-ntfsprogs_2021.8.22.bb | 1 + 2 files changed, 69 insertions(+) create mode 100644 meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30789.patch -- 2.17.1 This message contains information that may be privileged or confidential and is the property of the KPIT Technologies Ltd. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message. KPIT Technologies Ltd. does not accept any liability for virus infected mails. diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30789.patch b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30789.patch new file mode 100644 index 000000000..0ee3b7ae3 --- /dev/null +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs/CVE-2022-30789.patch @@ -0,0 +1,68 @@ +From 6efc1305c1951c1d72181f449f2fab68fa25fae8 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?Jean-Pierre=20Andr=C3=A9?= +Date: Wed, 20 Oct 2021 09:53:28 +0200 +Subject: [PATCH] Made sure the client log data does not overflow from restart + page + +Strengthen the consistency check of the length of restart pages, and +check that log client records are within such a restart page. + +CVE: CVE-2022-30789 +Upstream-Status: Backport [http://archive.ubuntu.com/ubuntu/pool/main/n/ntfs-3g/ntfs-3g_2021.8.22-3ubuntu1.1.debian.tar.xz] +Comment: No change in any hunk +Signed-off-by: Omkar Patil + +--- + libntfs-3g/logfile.c | 21 +++++++++++++++++++++ + 1 file changed, 21 insertions(+) + +diff --git a/libntfs-3g/logfile.c b/libntfs-3g/logfile.c +index adc0557f..9c3155e7 100644 +--- a/libntfs-3g/logfile.c ++++ b/libntfs-3g/logfile.c +@@ -287,9 +287,19 @@ static BOOL ntfs_check_log_client_array(RESTART_PAGE_HEADER *rp) + LOG_CLIENT_RECORD *ca, *cr; + u16 nr_clients, idx; + BOOL in_free_list, idx_is_first; ++ u32 offset_clients; + + ntfs_log_trace("Entering.\n"); ++ /* The restart area must be fully within page */ ++ if ((le16_to_cpu(rp->restart_area_offset) + sizeof(RESTART_AREA)) ++ > le32_to_cpu(rp->system_page_size)) ++ goto err_out; + ra = (RESTART_AREA*)((u8*)rp + le16_to_cpu(rp->restart_area_offset)); ++ offset_clients = le16_to_cpu(rp->restart_area_offset) ++ + le16_to_cpu(ra->client_array_offset); ++ /* The clients' records must begin within page */ ++ if (offset_clients >= le32_to_cpu(rp->system_page_size)) ++ goto err_out; + ca = (LOG_CLIENT_RECORD*)((u8*)ra + + le16_to_cpu(ra->client_array_offset)); + /* +@@ -308,6 +318,10 @@ static BOOL ntfs_check_log_client_array(RESTART_PAGE_HEADER *rp) + idx = le16_to_cpu(cr->next_client)) { + if (!nr_clients || idx >= le16_to_cpu(ra->log_clients)) + goto err_out; ++ /* The client record must be fully within page */ ++ if ((offset_clients + (idx + 1)*sizeof(LOG_CLIENT_RECORD)) ++ > le32_to_cpu(rp->system_page_size)) ++ goto err_out; + /* Set @cr to the current log client record. */ + cr = ca + idx; + /* The first log client record must not have a prev_client. */ +@@ -380,7 +394,14 @@ static int ntfs_check_and_load_restart_page(ntfs_attr *log_na, + /* + * Allocate a buffer to store the whole restart page so we can multi + * sector transfer deprotect it. ++ * For safety, make sure this is consistent with the usa_count ++ * and shorter than the full log size + */ ++ if ((le32_to_cpu(rp->system_page_size) ++ > (u32)(le16_to_cpu(rp->usa_count) - 1)*NTFS_BLOCK_SIZE) ++ || (le32_to_cpu(rp->system_page_size) ++ > le64_to_cpu(log_na->data_size))) ++ return (EINVAL); + trp = ntfs_malloc(le32_to_cpu(rp->system_page_size)); + if (!trp) + return errno; diff --git a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb index 0da80f8ff..c926d6ddd 100644 --- a/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb +++ b/meta-filesystems/recipes-filesystems/ntfs-3g-ntfsprogs/ntfs-3g-ntfsprogs_2021.8.22.bb @@ -16,6 +16,7 @@ SRC_URI = "http://tuxera.com/opensource/ntfs-3g_ntfsprogs-${PV}.tgz \ file://CVE-2022-30786-2.patch \ file://CVE-2022-30788-1.patch \ file://CVE-2022-30788-2.patch \ + file://CVE-2022-30789.patch \ " S = "${WORKDIR}/ntfs-3g_ntfsprogs-${PV}"