-------------------------------------------------------------------------------- Fedora EPEL Update Notification FEDORA-EPEL-2019-8d5207833a 2019-04-16 00:47:55.077854 --------------------------------------------------------------------------------
Name : ntfs-3g Product : Fedora EPEL 6 Version : 2017.3.23 Release : 11.el6 URL : http://www.ntfs-3g.org/ Summary : Linux NTFS userspace driver Description : NTFS-3G is a stable, open source, GPL licensed, POSIX, read/write NTFS driver for Linux and many other operating systems. It provides safe handling of the Windows XP, Windows Server 2003, Windows 2000, Windows Vista, Windows Server 2008 and Windows 7 NTFS file systems. NTFS-3G can create, remove, rename, move files, directories, hard links, and streams; it can read and write normal and transparently compressed files, including streams and sparse files; it can handle special files like symbolic links, devices, and FIFOs, ACL, extended attributes; moreover it provides full file access right and ownership support.
-------------------------------------------------------------------------------- Update Information:
Fix for CVE-2019-9755. -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1691624 - CVE-2019-9755 ntfs-3g: heap-based buffer overflow leads to local root privilege escalation https://bugzilla.redhat.com/show_bug.cgi?id=1691624 --------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use su -c 'yum update ntfs-3g' at the command line. For more information, refer to "YUM", available at https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7%5C /html/System_Administrators_Guide/ch-yum.html
All packages are signed with the Fedora EPEL GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------
epel-package-announce@lists.fedoraproject.org