Groups | Search | Server Info | Login | Register
Groups > linux.debian.announce.security > #4787
| From | Salvatore Bonaccorso <carnil@debian.org> |
|---|---|
| Newsgroups | linux.debian.announce.security |
| Subject | [SECURITY] [DSA 6221-1] ntfs-3g security update |
| Date | 2026-04-21 16:50 +0200 |
| Message-ID | <MMkAi-gTBt-3@gated-at.bofh.it> (permalink) |
| Organization | linux.* mail to news gateway |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6221-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso April 21, 2026 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ntfs-3g CVE ID : CVE-2026-40706 Andrea Bocchetti discovered a heap-based buffer overflow in NTFS-3G, a read-write NTFS driver for FUSE. A local user can take advantage of this flaw for local root privilege escalation. For the oldstable distribution (bookworm), this problem has been fixed in version 1:2022.10.3-1+deb12u3. For the stable distribution (trixie), this problem has been fixed in version 1:2022.10.3-5+deb13u1. We recommend that you upgrade your ntfs-3g packages. For the detailed security status of ntfs-3g please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ntfs-3g Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmnni5NfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Rc1w/+O16auaIz3+j8vV0X1Oe2IeXTLl1r1TFfBX6+PnphBJj3bJXbETg5yvk1 YxrnxrdbhWRSHG8JUh0jLtHUzUYr8LBwkIKH5CETUbZ4OWoIIimRuW3o6qlQQnzN 2uJqLMAjbIUmczwiqPAMmyn0wanVTRHk8795UqzdB5PBoIqaN6xexE3/uyhOvEcE BwIUF2fQNeQ0UhnzA2r5X1ZX4cejIDOIVngGusDO2QFLSErdLFoMe2ljmA861UMC MwuJU/QBK7IJn0GIU5OuEeZswk4o5Fvm/8kwbccX4VsKO7PYUbQIMBdWGIuLyRd/ fKbfTaj037WiFVCxx1F07IfA+8FF4ZmXC9EluWEbM+rekPkLCKkVjGhSix1LEg4E tK2UmZImuGZ/UouBjrp/iSqZ4Y6DhFz1nUsb1nhb86KOwII0LpVllOP2gy/HNPsm NGjnRhKhH22rZ+rh/mj7wz4JLOlP7NDaz0dWp9dHPzxOlt67iogGRQRKrdgFGEgo aXIRcHErfgxQ649A/I+6kwFGOgzf9zDUjfVoQck57r9P/bGZoybBPlh5A/FycJaH B0n+JJGcdY1+E61Yssdr0lkrW08eslsIhMggizBQiRM5c0csZpDesr1yylLN+Rk2 6s6lk0f9EYvDjKAqsV0cESoCpTAkOXr6Z1m+iVyNgpR4KNlO7yc= =GC6S -----END PGP SIGNATURE-----
Back to linux.debian.announce.security | Previous | Next | Find similar
[SECURITY] [DSA 6221-1] ntfs-3g security update Salvatore Bonaccorso <carnil@debian.org> - 2026-04-21 16:50 +0200
csiph-web