UBUNTU-CVE-2017-0358

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2017-0358
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-0358.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-0358
Related
Published
2017-02-01T14:00:00Z
Modified
2017-02-01T14:00:00Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.

References

Affected packages

Ubuntu:16.04:LTS / ntfs-3g

Package

Name
ntfs-3g
Purl
pkg:deb/ubuntu/ntfs-3g@1:2015.3.14AR.1-1ubuntu0.1?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2015.3.14AR.1-1ubuntu0.1

Affected versions

1:2014.*

1:2014.2.15AR.3-3

1:2015.*

1:2015.3.14AR.1-1
1:2015.3.14AR.1-1build1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "ntfs-3g-dev-dbgsym": "1:2015.3.14AR.1-1ubuntu0.1",
            "ntfs-3g": "1:2015.3.14AR.1-1ubuntu0.1",
            "ntfs-3g-dbg": "1:2015.3.14AR.1-1ubuntu0.1",
            "ntfs-3g-dev": "1:2015.3.14AR.1-1ubuntu0.1",
            "ntfs-3g-dbgsym": "1:2015.3.14AR.1-1ubuntu0.1",
            "ntfs-3g-udeb-dbgsym": "1:2015.3.14AR.1-1ubuntu0.1",
            "ntfs-3g-udeb": "1:2015.3.14AR.1-1ubuntu0.1"
        }
    ]
}