[Git][security-tracker-team/security-tracker][master] Reference oss-security post for ntfs-3g issues
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Jun 7 21:00:04 BST 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
ea4ee111 by Salvatore Bonaccorso at 2022-06-07T21:59:34+02:00
Reference oss-security post for ntfs-3g issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -4793,6 +4793,7 @@ CVE-2022-30787 (An integer underflow in fuse_lib_readdir enables arbitrary memor
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/2
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
+ NOTE: https://www.openwall.com/lists/oss-security/2022/06/07/4
NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
CVE-2022-30786 (A crafted NTFS image can cause a heap-based buffer overflow in ntfs_na ...)
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
@@ -4803,6 +4804,7 @@ CVE-2022-30785 (A file handle created in fuse_lib_opendir, and later used in fus
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/2
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
+ NOTE: https://www.openwall.com/lists/oss-security/2022/06/07/4
NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
CVE-2022-30784 (A crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_v ...)
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
@@ -4813,6 +4815,7 @@ CVE-2022-30783 (An invalid return code in fuse_kern_mount enables intercepting o
- ntfs-3g 1:2022.5.17-1 (bug #1011770)
NOTE: https://www.openwall.com/lists/oss-security/2022/05/26/2
NOTE: https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
+ NOTE: https://www.openwall.com/lists/oss-security/2022/06/07/4
NOTE: Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
CVE-2022-30782 (Openmoney API through 2020-06-29 uses the JavaScript Math.random funct ...)
NOT-FOR-US: Openmoney
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ea4ee111867f259edb63b22d27e83452b466298b
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ea4ee111867f259edb63b22d27e83452b466298b
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220607/afb5b243/attachment.htm>
More information about the debian-security-tracker-commits
mailing list