Bug 2093358 (CVE-2021-46790)

Summary: CVE-2021-46790 ntfs-3g: heap-based buffer overflow in ntfsck
Product: [Other] Security Response Reporter: Guilherme de Almeida Suckevicz <gsuckevi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ddepaula, epel-packagers-sig, jferlan, kparal, ngompa13, rjones, spotrh, virt-maint
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: ntfs-3g 2022.5.17 Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in NTFS-3G, specifically in the ntfsck utility. Incorrect validation of NTFS metadata can result in a heap-based buffer overflow when processing a crafted NTFS image file or partition.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-05-17 01:41:12 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2093363, 2093359, 2093360, 2093361, 2093362, 2127262, 2127263, 2127264, 2127265, 2127266, 2127267, 2127268    
Bug Blocks: 2093356    

Description Guilherme de Almeida Suckevicz 2022-06-03 14:15:28 UTC
ntfsck in NTFS-3G through 2021.8.22 has a heap-based buffer overflow involving buffer+512*3-2. NOTE: the upstream position is that ntfsck is deprecated; however, it is shipped by some Linux distributions.

References:
https://github.com/tuxera/ntfs-3g/issues/16
http://www.openwall.com/lists/oss-security/2022/05/26/1

Comment 1 Guilherme de Almeida Suckevicz 2022-06-03 14:15:56 UTC
Created ntfs-3g tracking bugs for this issue:

Affects: epel-all [bug 2093362]
Affects: fedora-all [bug 2093360]


Created ntfs-3g-system-compression tracking bugs for this issue:

Affects: epel-all [bug 2093363]
Affects: fedora-all [bug 2093361]


Created ntfs2btrfs tracking bugs for this issue:

Affects: fedora-all [bug 2093359]

Comment 3 errata-xmlrpc 2023-05-09 07:15:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:2179 https://access.redhat.com/errata/RHSA-2023:2179

Comment 4 errata-xmlrpc 2023-05-16 08:08:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:2757 https://access.redhat.com/errata/RHSA-2023:2757

Comment 5 Product Security DevOps Team 2023-05-17 01:41:10 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-46790