Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Debian Security Advisory 5270-1[6]
- Authored by Debian[7] | Site debian.org[8]
-
Debian Linux Security Advisory 5270-1 - Yuchen Zeng and Eduardo Vela discovered a buffer overflow in NTFS-3G, a read-write NTFS driver for FUSE, due to incorrect validation of some of the NTFS metadata. A local user can take advantage of this flaw for local root privilege escalation.
- systems | linux[9], debian[10]
- advisories | CVE-2022-40284[11]
- SHA-256 |
ca2f94088e74deaaa1112fe1dc761f03ded0dd6cfeb76363f112ada72eae8fb4
- Download[12] | Favorite[13] | View[14]
Change Mirror[15] Download[16]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5270-1Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
https://www.debian.org/security/ Salvatore Bonaccorso
November 04, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : ntfs-3g
CVE ID : CVE-2022-40284
Yuchen Zeng and Eduardo Vela discovered a buffer overflow in NTFS-3G, a
read-write NTFS driver for FUSE, due to incorrect validation of some of
the NTFS metadata. A local user can take advantage of this flaw for
local root privilege escalation.
For the stable distribution (bullseye), this problem has been fixed in
version 1:2017.3.23AR.3-4+deb11u3.
We recommend that you upgrade your ntfs-3g packages.
For the detailed security status of ntfs-3g please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/ntfs-3g
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list:Cette adresse e-mail est protégée contre les robots spammeurs. Vous devez activer le JavaScript pour la visualiser.
-----BEGIN PGP SIGNATURE-----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jcHQ
-----END PGP SIGNATURE-----
File Tags
- ActiveX[21] (932)
- Advisory[22] (79,332)
- Arbitrary[23] (15,604)
- BBS[24] (2,859)
- Bypass[25] (1,609)
- CGI[26] (1,015)
- Code Execution[27] (6,875)
- Conference[28] (672)
- Cracker[29] (840)
- CSRF[30] (3,282)
- DoS[31] (22,462)
- Encryption[32] (2,348)
- Exploit[33] (50,238)
- File Inclusion[34] (4,161)
- File Upload[35] (945)
- Firewall[36] (821)
- Info Disclosure[37] (2,649)
- Intrusion Detection[38] (863)
- Java[39] (2,884)
- JavaScript[40] (814)
- Kernel[41] (6,232)
- Local[42] (14,156)
- Magazine[43] (586)
- Overflow[44] (12,350)
- Perl[45] (1,417)
- PHP[46] (5,078)
- Proof of Concept[47] (2,287)
- Protocol[48] (3,413)
- Python[49] (1,441)
- Remote[50] (29,972)
- Root[51] (3,493)
- Ruby[52] (594)
- Scanner[53] (1,631)
- Security Tool[54] (7,760)
- Shell[55] (3,097)
- Shellcode[56] (1,204)
- Sniffer[57] (885)
- Spoof[58] (2,160)
- SQL Injection[59] (16,082)
- TCP[60] (2,375)
- Trojan[61] (682)
- UDP[62] (874)
- Virus[63] (660)
- Vulnerability[64] (31,028)
- Web[65] (9,296)
- Whitepaper[66] (3,724)
- x86[67] (944)
- XSS[68] (17,465)
- Other[69]
File Archives
- November 2022[70]
- October 2022[71]
- September 2022[72]
- August 2022[73]
- July 2022[74]
- June 2022[75]
- May 2022[76]
- April 2022[77]
- March 2022[78]
- February 2022[79]
- January 2022[80]
- December 2021[81]
- Older[82]
Systems
- AIX[83] (426)
- Apple[84] (1,923)
- BSD[85] (369)
- CentOS[86] (55)
- Cisco[87] (1,916)
- Debian[88] (6,602)
- Fedora[89] (1,690)
- FreeBSD[90] (1,242)
- Gentoo[91] (4,262)
- HPUX[92] (878)
- iOS[93] (329)
- iPhone[94] (108)
- IRIX[95] (220)
- Juniper[96] (67)
- Linux[97] (43,897)
- Mac OS X[98] (684)
- Mandriva[99] (3,105)
- NetBSD[100] (255)
- OpenBSD[101] (479)
- RedHat[102] (12,188)
- Slackware[103] (941)
- Solaris[104] (1,607)
- SUSE[105] (1,444)
- Ubuntu[106] (8,106)
- UNIX[107] (9,140)
- UnixWare[108] (185)
- Windows[109] (6,491)
- Other[110]
Read more https://packetstormsecurity.com/files/169730/dsa-5270-1.txt