From 8369787bb3d891ba4a1feb0adfd2e8f80b151546 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Thu, 21 Mar 2019 21:35:53 +0100 Subject: [DSA 4413-1] ntfs-3g security update --- english/security/2019/dsa-4413.data | 13 +++++++++++++ english/security/2019/dsa-4413.wml | 19 +++++++++++++++++++ 2 files changed, 32 insertions(+) create mode 100644 english/security/2019/dsa-4413.data create mode 100644 english/security/2019/dsa-4413.wml diff --git a/english/security/2019/dsa-4413.data b/english/security/2019/dsa-4413.data new file mode 100644 index 00000000000..cdc06179c04 --- /dev/null +++ b/english/security/2019/dsa-4413.data @@ -0,0 +1,13 @@ +DSA-4413-1 ntfs-3g +2019-3-21 +CVE-2019-9755 +ntfs-3g +yes +yes +no + +#use wml::debian::security + + + + diff --git a/english/security/2019/dsa-4413.wml b/english/security/2019/dsa-4413.wml new file mode 100644 index 00000000000..e5eb3a45f47 --- /dev/null +++ b/english/security/2019/dsa-4413.wml @@ -0,0 +1,19 @@ +security update + +

A heap-based buffer overflow was discovered in NTFS-3G, a read-write +NTFS driver for FUSE. A local user can take advantage of this flaw for +local root privilege escalation.

+ +

For the stable distribution (stretch), this problem has been fixed in +version 1:2016.2.22AR.1+dfsg-1+deb9u1.

+ +

We recommend that you upgrade your ntfs-3g packages.

+ +

For the detailed security status of ntfs-3g please refer to its security +tracker page at: +https://security-tracker.debian.org/tracker/ntfs-3g

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/security/2019/dsa-4413.data" +# $Id: $ -- cgit v1.2.3