USN-5711-1

Source
https://ubuntu.com/security/notices/USN-5711-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/USN-5711-1.json
Related
Published
2022-11-02T12:10:30.791551Z
Modified
2022-11-02T12:10:30.791551Z
Details

Yuchen Zeng and Eduardo Vela discovered that NTFS-3G incorrectly validated certain NTFS metadata. A local attacker could possibly use this issue to gain privileges.

References

Affected packages

Ubuntu:22.04:LTS / ntfs-3g

Package

Name
ntfs-3g

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1:2021.8.22-3ubuntu1.2

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "ntfs-3g": "1:2021.8.22-3ubuntu1.2",
            "libntfs-3g89": "1:2021.8.22-3ubuntu1.2",
            "ntfs-3g-dev": "1:2021.8.22-3ubuntu1.2"
        }
    ]
}

Ubuntu:20.04:LTS / ntfs-3g

Package

Name
ntfs-3g

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1:2017.3.23AR.3-3ubuntu1.3

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "ntfs-3g": "1:2017.3.23AR.3-3ubuntu1.3",
            "ntfs-3g-dev": "1:2017.3.23AR.3-3ubuntu1.3",
            "libntfs-3g883": "1:2017.3.23AR.3-3ubuntu1.3"
        }
    ]
}

Ubuntu:18.04:LTS / ntfs-3g

Package

Name
ntfs-3g

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
1:2017.3.23-2ubuntu0.18.04.5

Ecosystem specific

{
    "availability": "No subscription needed",
    "binaries": [
        {
            "ntfs-3g": "1:2017.3.23-2ubuntu0.18.04.5",
            "ntfs-3g-dev": "1:2017.3.23-2ubuntu0.18.04.5",
            "libntfs-3g88": "1:2017.3.23-2ubuntu0.18.04.5"
        }
    ]
}