USN-5463-1

Source
https://ubuntu.com/security/notices/USN-5463-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5463-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5463-1
Upstream
Related
Published
2022-06-07T14:15:00.644336Z
Modified
2025-10-13T04:35:57Z
Summary
ntfs-3g vulnerabilities
Details

It was discovered that NTFS-3G incorrectly handled the ntfsck tool. If a user or automated system were tricked into using ntfsck on a specially crafted disk image, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2021-46790)

Roman Fiedler discovered that NTFS-3G incorrectly handled certain return codes. A local attacker could possibly use this issue to intercept protocol traffic between FUSE and the kernel. (CVE-2022-30783)

It was discovered that NTFS-3G incorrectly handled certain NTFS disk images. If a user or automated system were tricked into mounting a specially crafted disk image, a remote attacker could use this issue to cause a denial of service, or possibly execute arbitrary code. (CVE-2022-30784, CVE-2022-30786, CVE-2022-30788, CVE-2022-30789)

Roman Fiedler discovered that NTFS-3G incorrectly handled certain file handles. A local attacker could possibly use this issue to read and write arbitrary memory. (CVE-2022-30785, CVE-2022-30787)

References

Affected packages

Ubuntu:18.04:LTS / ntfs-3g

Package

Name
ntfs-3g
Purl
pkg:deb/ubuntu/ntfs-3g@1:2017.3.23-2ubuntu0.18.04.4?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2017.3.23-2ubuntu0.18.04.4

Affected versions

1:2016.*

1:2016.2.22AR.2-2

1:2017.*

1:2017.3.23-2
1:2017.3.23-2ubuntu0.18.04.1
1:2017.3.23-2ubuntu0.18.04.2
1:2017.3.23-2ubuntu0.18.04.3

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libntfs-3g88",
            "binary_version": "1:2017.3.23-2ubuntu0.18.04.4"
        },
        {
            "binary_name": "ntfs-3g",
            "binary_version": "1:2017.3.23-2ubuntu0.18.04.4"
        },
        {
            "binary_name": "ntfs-3g-dev",
            "binary_version": "1:2017.3.23-2ubuntu0.18.04.4"
        }
    ]
}

Database specific

{
    "cves_map": {
        "ecosystem": "Ubuntu:18.04:LTS",
        "cves": [
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "low"
                    }
                ],
                "id": "CVE-2021-46790"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30783"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30784"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30785"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30786"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30787"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30788"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30789"
            }
        ]
    }
}

Ubuntu:20.04:LTS / ntfs-3g

Package

Name
ntfs-3g
Purl
pkg:deb/ubuntu/ntfs-3g@1:2017.3.23AR.3-3ubuntu1.2?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2017.3.23AR.3-3ubuntu1.2

Affected versions

1:2017.*

1:2017.3.23AR.3-3ubuntu1
1:2017.3.23AR.3-3ubuntu1.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libntfs-3g883",
            "binary_version": "1:2017.3.23AR.3-3ubuntu1.2"
        },
        {
            "binary_name": "ntfs-3g",
            "binary_version": "1:2017.3.23AR.3-3ubuntu1.2"
        },
        {
            "binary_name": "ntfs-3g-dev",
            "binary_version": "1:2017.3.23AR.3-3ubuntu1.2"
        }
    ]
}

Database specific

{
    "cves_map": {
        "ecosystem": "Ubuntu:20.04:LTS",
        "cves": [
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "low"
                    }
                ],
                "id": "CVE-2021-46790"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30783"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30784"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30785"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30786"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30787"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30788"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30789"
            }
        ]
    }
}

Ubuntu:22.04:LTS / ntfs-3g

Package

Name
ntfs-3g
Purl
pkg:deb/ubuntu/ntfs-3g@1:2021.8.22-3ubuntu1.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2021.8.22-3ubuntu1.1

Affected versions

1:2017.*

1:2017.3.23AR.3-3ubuntu5
1:2017.3.23AR.3-3ubuntu6

1:2021.*

1:2021.8.22-3ubuntu1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "libntfs-3g89",
            "binary_version": "1:2021.8.22-3ubuntu1.1"
        },
        {
            "binary_name": "ntfs-3g",
            "binary_version": "1:2021.8.22-3ubuntu1.1"
        },
        {
            "binary_name": "ntfs-3g-dev",
            "binary_version": "1:2021.8.22-3ubuntu1.1"
        }
    ]
}

Database specific

{
    "cves_map": {
        "ecosystem": "Ubuntu:22.04:LTS",
        "cves": [
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "low"
                    }
                ],
                "id": "CVE-2021-46790"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30783"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30784"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30785"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30786"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30787"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30788"
            },
            {
                "severity": [
                    {
                        "type": "CVSS_V3",
                        "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                    },
                    {
                        "type": "Ubuntu",
                        "score": "medium"
                    }
                ],
                "id": "CVE-2022-30789"
            }
        ]
    }
}