[ubuntu/kinetic-proposed] ntfs-3g 1:2022.5.17-1ubuntu1 (Accepted)

Marc Deslauriers marc.deslauriers at ubuntu.com
Tue Jun 7 15:02:11 UTC 2022


ntfs-3g (1:2022.5.17-1ubuntu1) kinetic; urgency=medium

  * Merge with Debian unstable. Remaining changes:
    - debian/ntfs-3g.postinst: don't install /bin/ntfs-3g as setuid root.
    - debian/control: don't Build-Depends on libfuse-dev since the package
      is built using the --with-fuse=internal option, switch to fuse3.

ntfs-3g (1:2022.5.17-1) unstable; urgency=high

  * New upstream release (closes: #1011770) fixing CVE-2021-46790,
    CVE-2022-30783, CVE-2022-30784, CVE-2022-30785, CVE-2022-30786,
    CVE-2022-30787, CVE-2022-30788 and CVE-2022-30789: these vulnerabilities
    may allow an attacker using a maliciously crafted NTFS-formatted image
    file or external storage to potentially execute arbitrary privileged code.

Date: Tue, 07 Jun 2022 10:33:43 -0400
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/ntfs-3g/1:2022.5.17-1ubuntu1
-------------- next part --------------
Format: 1.8
Date: Tue, 07 Jun 2022 10:33:43 -0400
Source: ntfs-3g
Built-For-Profiles: noudeb
Architecture: source
Version: 1:2022.5.17-1ubuntu1
Distribution: kinetic
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Marc Deslauriers <marc.deslauriers at ubuntu.com>
Closes: 1011770
Changes:
 ntfs-3g (1:2022.5.17-1ubuntu1) kinetic; urgency=medium
 .
   * Merge with Debian unstable. Remaining changes:
     - debian/ntfs-3g.postinst: don't install /bin/ntfs-3g as setuid root.
     - debian/control: don't Build-Depends on libfuse-dev since the package
       is built using the --with-fuse=internal option, switch to fuse3.
 .
 ntfs-3g (1:2022.5.17-1) unstable; urgency=high
 .
   * New upstream release (closes: #1011770) fixing CVE-2021-46790,
     CVE-2022-30783, CVE-2022-30784, CVE-2022-30785, CVE-2022-30786,
     CVE-2022-30787, CVE-2022-30788 and CVE-2022-30789: these vulnerabilities
     may allow an attacker using a maliciously crafted NTFS-formatted image
     file or external storage to potentially execute arbitrary privileged code.
Checksums-Sha1:
 3cc8ed44f4d7bc7e793d01c4421bc4b35d32c465 2209 ntfs-3g_2022.5.17-1ubuntu1.dsc
 ec9770d142373f2aeedb782b08956bb9a0d3dc7b 900383 ntfs-3g_2022.5.17.orig.tar.gz
 14ceb3e328dfafe856edbd3da07cf4a0aaed37eb 23188 ntfs-3g_2022.5.17-1ubuntu1.debian.tar.xz
 0ac2cfb3b4867893eccc027d3f1f1bed2c4c23f0 7046 ntfs-3g_2022.5.17-1ubuntu1_source.buildinfo
Checksums-Sha256:
 518109471ee5e7138dbe6a5394f634e55ec9c515ecb6e275964771d23a45eed0 2209 ntfs-3g_2022.5.17-1ubuntu1.dsc
 49680b2dd38c472368425923b0178195e24705fc355c78764632e5835000db49 900383 ntfs-3g_2022.5.17.orig.tar.gz
 5ad5da2e7bbdfd778a69bf82fe7c65dd953d7605adc876d231a3cd1fd75e595d 23188 ntfs-3g_2022.5.17-1ubuntu1.debian.tar.xz
 4ca3516ef7458621acf2aa5c27614bbdaa8cc61624f228dee8a3d4e6cf3efb5b 7046 ntfs-3g_2022.5.17-1ubuntu1_source.buildinfo
Files:
 d4de0089d43cc2f9a23bb563d8279dbc 2209 otherosfs optional ntfs-3g_2022.5.17-1ubuntu1.dsc
 eb292f78abb219385573427f234eb9bb 900383 otherosfs optional ntfs-3g_2022.5.17.orig.tar.gz
 54a93bee4460ba45d7c8eabc0752d7f8 23188 otherosfs optional ntfs-3g_2022.5.17-1ubuntu1.debian.tar.xz
 6b9830291e342a0f65c46dfdec810115 7046 otherosfs optional ntfs-3g_2022.5.17-1ubuntu1_source.buildinfo
Original-Maintainer: Laszlo Boszormenyi (GCS) <gcs at debian.org>


More information about the kinetic-changes mailing list