First published: Mon May 02 2022(Updated: )
ntfsck in NTFS-3G through 2021.8.22 has a heap-based buffer overflow involving buffer+512*3-2. NOTE: the upstream position is that ntfsck is deprecated; however, it is shipped by some Linux distributions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tuxera Ntfs-3g | <=2021.8.22 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
debian/ntfs-3g | 1:2017.3.23AR.3-3+deb10u2 1:2017.3.23AR.3-3+deb10u3 1:2017.3.23AR.3-4+deb11u3 1:2022.10.3-1 | |
redhat/ntfs-3g | <2022.5.17 | 2022.5.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-46790.
The severity of CVE-2021-46790 is high with a severity value of 7.8.
NTFS-3G versions up to 2021.8.22, Tuxera Ntfs-3g, Debian Linux versions 10.0 and 11.0, and Fedora versions 35 and 36 are affected by CVE-2021-46790.
The recommended remedy for CVE-2021-46790 is to update to version 2022.10.3-1 of the ntfs-3g package for Debian Linux, and to update to version 2022.5.17 or later for Fedora.
You can find more information about CVE-2021-46790 at the following references: [CVE-2021-46790](https://security-tracker.debian.org/tracker/CVE-2021-46790), [CVE-2022-30783](https://security-tracker.debian.org/tracker/CVE-2022-30783), [CVE-2022-30784](https://security-tracker.debian.org/tracker/CVE-2022-30784).