Debian 10032 Published by

A ntfs-3g security update has been released for Debian GNU/Linux 9 LTS to address several vulnerabilities.

DLA 3055-1: ntfs-3g security update

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3055-1 Sylvain Beucler
June 21, 2022
- -------------------------------------------------------------------------

Package : ntfs-3g
Version : 1:2016.2.22AR.1+dfsg-1+deb9u3
CVE ID : CVE-2022-30783 CVE-2022-30784 CVE-2022-30785 CVE-2022-30786
CVE-2022-30787 CVE-2022-30788 CVE-2022-30789
Debian Bug : 1011770

Several vulnerabilities were discovered in NTFS-3G, a read-write NTFS
driver for FUSE. A local user can take advantage of these flaws for
local root privilege escalation.


An invalid return code in fuse_kern_mount enables intercepting of
libfuse-lite protocol traffic between NTFS-3G and the kernel when
using libfuse-lite.


A crafted NTFS image can cause heap exhaustion in


A file handle created in fuse_lib_opendir, and later used in
fuse_lib_readdir, enables arbitrary memory read and write
operations when using libfuse-lite.


A crafted NTFS image can cause a heap-based buffer overflow in


An integer underflow in fuse_lib_readdir enables arbitrary memory
read operations when using libfuse-lite.


A crafted NTFS image can cause a heap-based buffer overflow in


A crafted NTFS image can cause a heap-based buffer overflow in

For Debian 9 stretch, these problems have been fixed in version

We recommend that you upgrade your ntfs-3g packages.

For the detailed security status of ntfs-3g please refer to
its security tracker page at:

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: