diff options
author | Repository mirror & CI <repomirrorci@gentoo.org> | 2023-01-11 05:32:20 +0000 |
---|---|---|
committer | Repository mirror & CI <repomirrorci@gentoo.org> | 2023-01-11 05:32:20 +0000 |
commit | 2a3cf2fe07454caf7bca94982256c24e88d1420b (patch) | |
tree | 2e2c13570101836a4e3664dfb881c5ec2ca6b791 /metadata/glsa/glsa-202301-01.xml | |
parent | Merge updates from master (diff) | |
parent | [ GLSA 202301-09 ] protobuf-java: Denial of Service (diff) | |
download | gentoo-2a3cf2fe07454caf7bca94982256c24e88d1420b.tar.gz gentoo-2a3cf2fe07454caf7bca94982256c24e88d1420b.tar.bz2 gentoo-2a3cf2fe07454caf7bca94982256c24e88d1420b.zip |
Merge commit 'da9b5483883fcc611753d44d34c0ede9188ce21c'
Diffstat (limited to 'metadata/glsa/glsa-202301-01.xml')
-rw-r--r-- | metadata/glsa/glsa-202301-01.xml | 72 |
1 files changed, 72 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-202301-01.xml b/metadata/glsa/glsa-202301-01.xml new file mode 100644 index 000000000000..70ca0247214c --- /dev/null +++ b/metadata/glsa/glsa-202301-01.xml @@ -0,0 +1,72 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202301-01"> + <title>NTFS-3G: Multiple Vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in NTFS-3G, the worst of which could result in arbitrary code execution.</synopsis> + <product type="ebuild">ntfs3g</product> + <announced>2023-01-11</announced> + <revised count="1">2023-01-11</revised> + <bug>878885</bug> + <bug>847598</bug> + <bug>811156</bug> + <access>remote</access> + <affected> + <package name="sys-fs/ntfs3g" auto="yes" arch="*"> + <unaffected range="ge">2022.10.3</unaffected> + <vulnerable range="lt">2022.10.3</vulnerable> + </package> + </affected> + <background> + <p>NTFS-3G is a stable, full-featured, read-write NTFS driver for various operating systems.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in NTFS-3G. Please review the CVE identifiers referenced below for details.</p> + </description> + <impact type="high"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All NTFS-3G users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-fs/ntfs3g-2022.10.3" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-33285">CVE-2021-33285</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-33286">CVE-2021-33286</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-33287">CVE-2021-33287</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-33289">CVE-2021-33289</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-35266">CVE-2021-35266</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-35267">CVE-2021-35267</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-35268">CVE-2021-35268</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-35269">CVE-2021-35269</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39251">CVE-2021-39251</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39252">CVE-2021-39252</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39253">CVE-2021-39253</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39254">CVE-2021-39254</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39255">CVE-2021-39255</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39256">CVE-2021-39256</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39257">CVE-2021-39257</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39258">CVE-2021-39258</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39259">CVE-2021-39259</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39260">CVE-2021-39260</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39261">CVE-2021-39261</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39262">CVE-2021-39262</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39263">CVE-2021-39263</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30783">CVE-2022-30783</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30784">CVE-2022-30784</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30785">CVE-2022-30785</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30786">CVE-2022-30786</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30787">CVE-2022-30787</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30788">CVE-2022-30788</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30789">CVE-2022-30789</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-40284">CVE-2022-40284</uri> + </references> + <metadata tag="requester" timestamp="2023-01-11T05:15:14.346677Z">ajak</metadata> + <metadata tag="submitter" timestamp="2023-01-11T05:15:14.351130Z">ajak</metadata> +</glsa>
\ No newline at end of file |