DSA-5270-1 ntfs-3g -- security update

Related Vulnerabilities: CVE-2022-40284  

Yuchen Zeng and Eduardo Vela discovered a buffer overflow in NTFS-3G, a read-write NTFS driver for FUSE, due to incorrect validation of some of the NTFS metadata. A local user can take advantage of this flaw for local root privilege escalation. For the stable distribution (bullseye), this problem has been fixed in version 1:2017.3.23AR.3-4+deb11u3. We recommend that you upgrade your ntfs-3g packages. For the detailed security status of ntfs-3g please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ntfs-3g

Debian Security Advisory

DSA-5270-1 ntfs-3g -- security update

Date Reported:
04 Nov 2022
Affected Packages:
ntfs-3g
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2022-40284.
More information:

Yuchen Zeng and Eduardo Vela discovered a buffer overflow in NTFS-3G, a read-write NTFS driver for FUSE, due to incorrect validation of some of the NTFS metadata. A local user can take advantage of this flaw for local root privilege escalation.

For the stable distribution (bullseye), this problem has been fixed in version 1:2017.3.23AR.3-4+deb11u3.

We recommend that you upgrade your ntfs-3g packages.

For the detailed security status of ntfs-3g please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ntfs-3g