{"id":"UBUNTU-CVE-2022-30783","details":"An invalid return code in fuse_kern_mount enables intercepting of libfuse-lite protocol traffic between NTFS-3G and the kernel in NTFS-3G through 2021.8.22 when using libfuse-lite.","modified":"2026-02-04T03:13:10.492180Z","published":"2022-05-26T16:15:00Z","related":["USN-5463-1","USN-5463-2"],"upstream":["CVE-2022-30783"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-30783"},{"type":"REPORT","url":"https://www.openwall.com/lists/oss-security/2022/05/26/2"},{"type":"REPORT","url":"https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58"},{"type":"REPORT","url":"https://github.com/tuxera/ntfs-3g/releases"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5463-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5463-2"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-30783"}],"affected":[{"package":{"name":"ntfs-3g","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/ntfs-3g@1:2013.1.13AR.1-2ubuntu2+esm3?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2013.1.13AR.1-2ubuntu2+esm3"}]}],"versions":["1:2013.1.13AR.1-2ubuntu1","1:2013.1.13AR.1-2ubuntu2","1:2013.1.13AR.1-2ubuntu2+esm1","1:2013.1.13AR.1-2ubuntu2+esm2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"1:2013.1.13AR.1-2ubuntu2+esm3","binary_name":"ntfs-3g"},{"binary_version":"1:2013.1.13AR.1-2ubuntu2+esm3","binary_name":"ntfs-3g-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-30783.json"}},{"package":{"name":"ntfs-3g","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/ntfs-3g@1:2015.3.14AR.1-1ubuntu0.3+esm3?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2015.3.14AR.1-1ubuntu0.3+esm3"}]}],"versions":["1:2014.2.15AR.3-3","1:2015.3.14AR.1-1","1:2015.3.14AR.1-1build1","1:2015.3.14AR.1-1ubuntu0.1","1:2015.3.14AR.1-1ubuntu0.2","1:2015.3.14AR.1-1ubuntu0.3","1:2015.3.14AR.1-1ubuntu0.3+esm1","1:2015.3.14AR.1-1ubuntu0.3+esm2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_version":"1:2015.3.14AR.1-1ubuntu0.3+esm3","binary_name":"ntfs-3g"},{"binary_version":"1:2015.3.14AR.1-1ubuntu0.3+esm3","binary_name":"ntfs-3g-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-30783.json"}},{"package":{"name":"ntfs-3g","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/ntfs-3g@1:2017.3.23-2ubuntu0.18.04.4?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2017.3.23-2ubuntu0.18.04.4"}]}],"versions":["1:2016.2.22AR.2-2","1:2017.3.23-2","1:2017.3.23-2ubuntu0.18.04.1","1:2017.3.23-2ubuntu0.18.04.2","1:2017.3.23-2ubuntu0.18.04.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:2017.3.23-2ubuntu0.18.04.4","binary_name":"libntfs-3g88"},{"binary_version":"1:2017.3.23-2ubuntu0.18.04.4","binary_name":"ntfs-3g"},{"binary_version":"1:2017.3.23-2ubuntu0.18.04.4","binary_name":"ntfs-3g-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-30783.json"}},{"package":{"name":"ntfs-3g","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/ntfs-3g@1:2017.3.23AR.3-3ubuntu1.2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2017.3.23AR.3-3ubuntu1.2"}]}],"versions":["1:2017.3.23AR.3-3ubuntu1","1:2017.3.23AR.3-3ubuntu1.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:2017.3.23AR.3-3ubuntu1.2","binary_name":"libntfs-3g883"},{"binary_version":"1:2017.3.23AR.3-3ubuntu1.2","binary_name":"ntfs-3g"},{"binary_version":"1:2017.3.23AR.3-3ubuntu1.2","binary_name":"ntfs-3g-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-30783.json"}},{"package":{"name":"ntfs-3g","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/ntfs-3g@1:2021.8.22-3ubuntu1.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2021.8.22-3ubuntu1.1"}]}],"versions":["1:2017.3.23AR.3-3ubuntu5","1:2017.3.23AR.3-3ubuntu6","1:2021.8.22-3ubuntu1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"1:2021.8.22-3ubuntu1.1","binary_name":"libntfs-3g89"},{"binary_version":"1:2021.8.22-3ubuntu1.1","binary_name":"ntfs-3g"},{"binary_version":"1:2021.8.22-3ubuntu1.1","binary_name":"ntfs-3g-dev"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-30783.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}