CVE-2022-30789

NameCVE-2022-30789
DescriptionA crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array in NTFS-3G through 2021.8.22.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3055-1, DSA-5160-1
Debian Bugs1011770

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ntfs-3g (PTS)buster1:2017.3.23AR.3-3+deb10u2fixed
buster (security)1:2017.3.23AR.3-3+deb10u3fixed
bullseye (security), bullseye1:2017.3.23AR.3-4+deb11u3fixed
trixie, bookworm1:2022.10.3-1fixed
sid1:2022.10.3-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ntfs-3gsourcestretch1:2016.2.22AR.1+dfsg-1+deb9u3DLA-3055-1
ntfs-3gsourcebuster1:2017.3.23AR.3-3+deb10u2DSA-5160-1
ntfs-3gsourcebullseye1:2017.3.23AR.3-4+deb11u2DSA-5160-1
ntfs-3gsource(unstable)1:2022.5.17-11011770

Notes

https://www.openwall.com/lists/oss-security/2022/05/26/1
https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
Patches: https://github.com/tuxera/ntfs-3g/compare/2021.8.22...2022.5.17
https://github.com/tuxera/ntfs-3g/commit/6efc1305c1951c1d72181f449f2fab68fa25fae8 (2022.5.17)

Search for package or bug name: Reporting problems