Ubuntu 5711-2: NTFS-3G vulnerability | LinuxSecurity.com
==========================================================================
Ubuntu Security Notice USN-5711-2
November 03, 2022

ntfs-3g vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

NTFS-3G could be made to crash or run programs as an administrator
if it mounted a specially crafted disk.

Software Description:
- ntfs-3g: read/write NTFS driver for FUSE

Details:

USN-5711-1 fixed a vulnerability in NTFS-3G. This update provides
the corresponding update for Ubuntu 14.04 ESM Ubuntu 16.04 ESM.

Original advisory details:

 Yuchen Zeng and Eduardo Vela discovered that NTFS-3G incorrectly validated
 certain NTFS metadata. A local attacker could possibly use this issue to
 gain privileges.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  ntfs-3g                         1:2015.3.14AR.1-1ubuntu0.3+esm4

Ubuntu 14.04 ESM:
  ntfs-3g                         1:2013.1.13AR.1-2ubuntu2+esm4

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5711-2
  https://ubuntu.com/security/notices/USN-5711-1
  CVE-2022-40284

Ubuntu 5711-2: NTFS-3G vulnerability

November 3, 2022

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: NTFS-3G could be made to crash or run programs as an administrator if it mounted a specially crafted disk. Software Description: - ntfs-3g: read/write NTFS driver for FUSE Details: USN-5711-1 fixed a vulnerability in NTFS-3G. This update provides the corresponding update for Ubuntu 14.04 ESM Ubuntu 16.04 ESM. Original advisory details: Yuchen Zeng and Eduardo Vela discovered that NTFS-3G incorrectly validated certain NTFS metadata. A local attacker could possibly use this issue to gain privileges.

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: ntfs-3g 1:2015.3.14AR.1-1ubuntu0.3+esm4 Ubuntu 14.04 ESM: ntfs-3g 1:2013.1.13AR.1-2ubuntu2+esm4 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5711-2

https://ubuntu.com/security/notices/USN-5711-1

CVE-2022-40284

Severity
Ubuntu Security Notice USN-5711-2

Package Information

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.