Debian LTS: DLA-3055-1: ntfs-3g security update
Summary
CVE-2022-30783
An invalid return code in fuse_kern_mount enables intercepting of
libfuse-lite protocol traffic between NTFS-3G and the kernel when
using libfuse-lite.
CVE-2022-30784
A crafted NTFS image can cause heap exhaustion in
ntfs_get_attribute_value.
CVE-2022-30785
A file handle created in fuse_lib_opendir, and later used in
fuse_lib_readdir, enables arbitrary memory read and write
operations when using libfuse-lite.
CVE-2022-30786
A crafted NTFS image can cause a heap-based buffer overflow in
ntfs_names_full_collate.
CVE-2022-30787
An integer underflow in fuse_lib_readdir enables arbitrary memory
read operations when using libfuse-lite.
CVE-2022-30788
A crafted NTFS image can cause a heap-based buffer overflow in
ntfs_mft_rec_alloc.
CVE-2022-30789
A crafted NTFS image can cause a heap-based buffer overflow in
ntfs_check_log_client_array.
For Debian 9 stretch, these problems have been fixed in version
1:2016.2.22AR.1+dfsg-1+deb9u3.
We ...