[Git][security-tracker-team/security-tracker][master] Reference collection of commits needed for ntfs-3g fixes
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Jun 2 11:44:13 BST 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
cf4de748 by Salvatore Bonaccorso at 2022-06-02T12:43:46+02:00
Reference collection of commits needed for ntfs-3g fixes
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -3941,30 +3941,37 @@ CVE-2022-30789 (A crafted NTFS image can cause a heap-based buffer overflow in n
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
+ NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
CVE-2022-30788 (A crafted NTFS image can cause a heap-based buffer overflow in ntfs_mf ...)
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
+ NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
CVE-2022-30787 (An integer underflow in fuse_lib_readdir enables arbitrary memory read ...)
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/2
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
+ NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
CVE-2022-30786 (A crafted NTFS image can cause a heap-based buffer overflow in ntfs_na ...)
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
+ NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
CVE-2022-30785 (A file handle created in fuse_lib_opendir, and later used in fuse_lib_ ...)
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/2
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
+ NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
CVE-2022-30784 (A crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_v ...)
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
+ NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
CVE-2022-30783 (An invalid return code in fuse_kern_mount enables intercepting of libf ...)
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/2
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
+ NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
CVE-2022-30782 (Openmoney API through 2020-06-29 uses the JavaScript Math.random funct ...)
NOT-FOR-US: Openmoney
CVE-2022-30781 (Gitea before 1.16.7 does not escape git fetch remote. ...)
@@ -6130,6 +6137,7 @@ CVE-2021-46790 (ntfsck in NTFS-3G through 2021.8.22 has a heap-based buffer over
NOTE: https://github.com/tuxera/ntfs-3g/issues/16
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/1
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
+ NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
CVE-2022-1544 (Formula Injection/CSV Injection due to Improper Neutralization of Form ...)
NOT-FOR-US: yii-helpers
CVE-2022-29967 (static_compressed_inmemory_website_callback.c in Glewlwyd through 2.6. ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cf4de748c7519bb353858fd5d61727d568d9bdcb
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cf4de748c7519bb353858fd5d61727d568d9bdcb
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220602/bc10604f/attachment.htm>
More information about the debian-security-tracker-commits
mailing list