Fedora Linux 8782 Published by

A ntfs-3g-system-compression security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: ntfs-3g-system-compression-1.0-9.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-1176b501f0
2022-06-24 01:25:24.273343
--------------------------------------------------------------------------------

Name : ntfs-3g-system-compression
Product : Fedora 35
Version : 1.0
Release : 9.fc35
URL :   https://github.com/ebiggers/ntfs-3g-system-compression
Summary : NTFS-3G plugin for reading "system compressed" files
Description :
System compression, also known as "Compact OS", is a Windows feature that
allows rarely modified files to be compressed using the XPRESS or LZX
compression formats. It is not built directly into NTFS but rather is
implemented using reparse points. This feature appeared in Windows 10 and it
appears that many Windows 10 systems have been using it by default.

This RPM contains a plugin which enables the NTFS-3G FUSE driver to
transparently read from system-compressed files. Currently, only reading is
supported. Compressing an existing file may be done by using the "compact"
utility on Windows.

--------------------------------------------------------------------------------
Update Information:

Rebuild for ntfs-3g CVE
--------------------------------------------------------------------------------
ChangeLog:

* Wed Jun 8 2022 Richard W.M. Jones - 1.0-9
- Rebuild for ntfs-3g CVE
* Thu Jan 20 2022 Fedora Release Engineering - 1.0-8
- Rebuilt for   https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2093310 - CVE-2022-30783 ntfs-3g-system-compression: ntfs-3g: invalid return code in fuse_kern_mount enables intercepting of libfuse-lite protocol traffic [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2093310
[ 2 ] Bug #2093319 - CVE-2022-30784 ntfs-3g-system-compression: ntfs-3g: crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_value [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2093319
[ 3 ] Bug #2093325 - CVE-2022-30785 ntfs-3g-system-compression: ntfs-3g: a file handle created in fuse_lib_opendir, and later used in fuse_lib_readdir, enables arbitrary memory read and write operations [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2093325
[ 4 ] Bug #2093331 - CVE-2022-30786 ntfs-3g-system-compression: ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_names_full_collate [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2093331
[ 5 ] Bug #2093338 - CVE-2022-30787 ntfs-3g-system-compression: ntfs-3g: integer underflow in fuse_lib_readdir enables arbitrary memory read operations [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2093338
[ 6 ] Bug #2093345 - CVE-2022-30788 ntfs-3g-system-compression: ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2093345
[ 7 ] Bug #2093352 - CVE-2022-30789 ntfs-3g-system-compression: ntfs-3g: crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2093352
[ 8 ] Bug #2093361 - CVE-2021-46790 ntfs-3g-system-compression: ntfs-3g: heap-based buffer overflow in ntfsck [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2093361
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-1176b501f0' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________