Accepted ntfs-3g 1:2017.3.23AR.3-4+deb11u2 (source) into proposed-updates->stable-new, proposed-updates
- To: debian-changes@lists.debian.org
- Subject: Accepted ntfs-3g 1:2017.3.23AR.3-4+deb11u2 (source) into proposed-updates->stable-new, proposed-updates
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sat, 18 Jun 2022 10:32:23 +0000
- Dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ftp-master.debian.org; s=smtpauto.fasolo; h=Date:Message-Id:Subject: Content-Transfer-Encoding:Content-Type:MIME-Version:To:Reply-To:From:Cc: Content-ID:Content-Description:In-Reply-To:References; bh=F2kma39AgjW/HckrG5DMOqOL2WBb+PksvtK305rlAps=; b=i7DZq0hJIyjmPqPxkm5lq0y8Yz onoWqqon1uS9jl6kwEGs/UAWkMp//ESG3Mh1z+/ox/t7L1LYg/hicp+heNYr3q2DnimYj0Pejn71+ D6v3cWMFRCEU6hauFPkELkmFN82aMV7oIWi+W7UrLDZf3WvzdPVHpmv2F+IadwUdSLFUOKskSZL7V g9W34QoTBkeZT4nQo/uaPjAcctx+d8hkAjHcR4ft3YE4HgrHmKgj1dS22J+seioEXTcXZf+F+DNSz KTBHLEIyQhw4lMFryaKKOE0J6TOCCyZiveYYl2yAsh4hG5otqWwgUtems+eH+jRJPqksOsoVmcbo9 Wv6KhHOw==;
- Mail-followup-to: debian-devel@lists.debian.org
- Message-id: <E1o2Vkd-000ALD-KG@fasolo.debian.org>
- Reply-to: debian-devel@lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 08 Jun 2022 22:42:53 +0200
Source: ntfs-3g
Architecture: source
Version: 1:2017.3.23AR.3-4+deb11u2
Distribution: bullseye-security
Urgency: high
Maintainer: Laszlo Boszormenyi (GCS) <gcs@debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 1011770
Changes:
ntfs-3g (1:2017.3.23AR.3-4+deb11u2) bullseye-security; urgency=high
.
* Non-maintainer upload by the Security Team.
* Fix multiple issues (Closes: #1011770)
- Used a default usn when the former one cannot be retrieved
(CVE-2022-30788)
- Made sure there is no null character in an attribute name
(CVE-2022-30786)
- Avoided allocating and reading an attribute beyond its full size
(CVE-2022-30784)
- Made sure the client log data does not overflow from restart page
(CVE-2022-30789)
- Made sure there is no null character in an attribute name (bis)
(CVE-2022-30786)
- Fixed possible out-of-buffer condition in ntfsck (CVE-2021-46790)
- Fixed operation on little endian data (CVE-2022-30788)
- Returned an error code when the --help or --version options are
used (CVE-2022-30783)
- Hardened the checking of directory offset requested by a readdir
(CVE-2022-30785, CVE-2022-30787)
Checksums-Sha1:
33c9217875ac113fdd4c5c3cb1508da390a83484 2369 ntfs-3g_2017.3.23AR.3-4+deb11u2.dsc
c38c9017df2fd55f9bbec2457bea5cf2a7625f3b 39220 ntfs-3g_2017.3.23AR.3-4+deb11u2.debian.tar.xz
Checksums-Sha256:
86f4c8342b10ac24fd1e0627fde0d0fab6150ea3e2f1d2da98060af5294bcd0d 2369 ntfs-3g_2017.3.23AR.3-4+deb11u2.dsc
2e7dec50b40735354d4621e54a35f19130ff2df91f4e8630c450f4e9481bd88d 39220 ntfs-3g_2017.3.23AR.3-4+deb11u2.debian.tar.xz
Files:
29263ddf93811f1ebedc788cc97b61d1 2369 otherosfs optional ntfs-3g_2017.3.23AR.3-4+deb11u2.dsc
bad6fc45608aed3431d08c8f90b03b21 39220 otherosfs optional ntfs-3g_2017.3.23AR.3-4+deb11u2.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=8B2m
-----END PGP SIGNATURE-----