Fedora Linux 8568 Published by

A ntfs-3g security update has been released for Fedora 33.



SECURITY: Fedora 33 Update: ntfs-3g-2021.8.22-2.fc33


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-e7c8ba6301
2021-09-23 19:28:47.071848
--------------------------------------------------------------------------------

Name : ntfs-3g
Product : Fedora 33
Version : 2021.8.22
Release : 2.fc33
URL :   https://www.tuxera.com/company/open-source/
Summary : Linux NTFS userspace driver
Description :
NTFS-3G is a stable, open source, GPL licensed, POSIX, read/write NTFS
driver for Linux and many other operating systems. It provides safe
handling of the Windows XP, Windows Server 2003, Windows 2000, Windows
Vista, Windows Server 2008 and Windows 7 NTFS file systems. NTFS-3G can
create, remove, rename, move files, directories, hard links, and streams;
it can read and write normal and transparently compressed files, including
streams and sparse files; it can handle special files like symbolic links,
devices, and FIFOs, ACL, extended attributes; moreover it provides full
file access right and ownership support.

--------------------------------------------------------------------------------
Update Information:

Fix issue with incorrect obsoletes.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Sep 8 2021 Tom Callaway - 2:2021.8.22-2
- remove incorrect obsoletes
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2001608 - CVE-2021-33285 ntfs3g: when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur.
  https://bugzilla.redhat.com/show_bug.cgi?id=2001608
[ 2 ] Bug #2001613 - CVE-2021-33287 ntfs-3g: When specially crafted NTFS attributes are read in the function ntfs_attr_pread_i, a heap buffer overflow can occur
  https://bugzilla.redhat.com/show_bug.cgi?id=2001613
[ 3 ] Bug #2001616 - CVE-2021-33289 ntfs-3g: When a specially crafted MFT section is supplied in an NTFS image a heap buffer overflow can occur
  https://bugzilla.redhat.com/show_bug.cgi?id=2001616
[ 4 ] Bug #2001619 - CVE-2021-35266 ntfs-3g: When a specially crafted NTFS inode pathname is supplied in an NTFS image a heap buffer overflow can occur
  https://bugzilla.redhat.com/show_bug.cgi?id=2001619
[ 5 ] Bug #2001621 - CVE-2021-35267 ntfs-3g: A stack buffer overflow can occur when correcting differences in the MFT and MFTMirror allowing for code execution
  https://bugzilla.redhat.com/show_bug.cgi?id=2001621
[ 6 ] Bug #2001623 - CVE-2021-35268 ntfs-3g: When a specially crafted NTFS inode is loaded in the function ntfs_inode_real_open, a heap buffer overflow can occur
  https://bugzilla.redhat.com/show_bug.cgi?id=2001623
[ 7 ] Bug #2001645 - CVE-2021-35269 ntfs-3g: when a specially crafted NTFS attribute from the MFT is setup in the function ntfs_attr_setup_flag, a heap buffer overflow can occur
  https://bugzilla.redhat.com/show_bug.cgi?id=2001645
[ 8 ] Bug #2001649 - CVE-2021-39251 ntfs-3g: A crafted NTFS image can cause a NULL pointer dereference in ntfs_extent_inode_open
  https://bugzilla.redhat.com/show_bug.cgi?id=2001649
[ 9 ] Bug #2001650 - CVE-2021-39252 ntfs-3g: A crafted NTFS image can cause an out-of-bounds read in ntfs_ie_lookup
  https://bugzilla.redhat.com/show_bug.cgi?id=2001650
[ 10 ] Bug #2001651 - CVE-2021-39253 ntfs-3g: A crafted NTFS image can cause an out-of-bounds read in ntfs_runlists_merge_i
  https://bugzilla.redhat.com/show_bug.cgi?id=2001651
[ 11 ] Bug #2001652 - CVE-2021-39254 ntfs-3g: A crafted NTFS image can cause an integer overflow in memmove, leading to a heap-based buffer overflow
  https://bugzilla.redhat.com/show_bug.cgi?id=2001652
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-e7c8ba6301' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys