Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3201-1 | ntfs-3g security update |
Debian DSA |
DSA-5270-1 | ntfs-3g security update |
EUVD |
EUVD-2022-43581 | A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device. |
Ubuntu USN |
USN-5711-1 | NTFS-3G vulnerability |
Ubuntu USN |
USN-5711-2 | NTFS-3G vulnerability |
Fri, 02 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-02T18:42:11.770Z
Reserved: 2022-09-08T00:00:00.000Z
Link: CVE-2022-40284
Updated: 2024-08-03T12:14:39.985Z
Status : Modified
Published: 2022-11-06T23:15:09.463
Modified: 2025-05-02T19:15:53.693
Link: CVE-2022-40284
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN