{"id":"CVE-2021-35269","details":"NTFS-3G versions \u003c 2021.8.22, when a specially crafted NTFS attribute from the MFT is setup in the function ntfs_attr_setup_flag, a heap buffer overflow can occur allowing for code execution and escalation of privileges.","modified":"2026-05-18T05:53:03.693526185Z","published":"2021-09-07T14:15:11.723Z","related":["ALSA-2022:1759","SUSE-SU-2021:2965-1","SUSE-SU-2021:2971-1","openSUSE-SU-2021:1244-1","openSUSE-SU-2021:2971-1","openSUSE-SU-2024:11101-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"9.0"},{"last_affected":"10.0"},{"last_affected":"11.0"}]},{"source":"CPE_FIELD","cpes":["cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"],"vendor_product":"fedoraproject:fedora","extracted_events":[{"last_affected":"33"},{"last_affected":"35"}]}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/766ISTT3KCARKFUIQT7N6WV6T63XOKG3/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSEKTKHO5HFZHWZNJNBJZA56472KRUZI/"},{"type":"ADVISORY","url":"http://ntfs-3g.com"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/08/30/1"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/11/msg00013.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202301-01"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4971"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tuxera/ntfs-3g","events":[{"introduced":"0"},{"fixed":"31ac7e4f0fc07beeca455eba6a8f02abd7e4d76f"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"2021.8.22"}]}}],"versions":["2021.8.14","2021.5.19","2017.3.23","2017.2.15","2016.2.22","2016.2.15","2015.3.14","2015.3.13","2015.3.5","2014.2.15","v2013_1_13","v2012_1_15","v2011_10_9_RC","v2011_4_12","v2011_4_11","v2011_4_10","v2011_3_28_RC","v2011_3_26","2011_3_26","N2010_10_2","N2010_8_8","N2010_7_23_RC","N2010_6_31_RC","N2010_6_30_RC","N2010_5_22","N2010_5_16","N2010_2_6","R2009_10_5_RC","N2009_10_03_104125","N2009_10_03_095644","PERMISSION_HANDLING_BASE_20070925","N1_913","N1_910_RC","N1_826","N1_810","N1_710","N1_616","N1_612_RC","N1_516","N1_417","N1_416","N1_411_RC","N1_328","N1_320_RC","N1_0","N0_20070207_RC1","N0_20070118_BETA","N0_20070116_BETA","N0_20070102_BETA","N0_20061218_BETA","N0_20061212_BETA","N2006_11_14_220946","N0_20061115_BETA","N2006_11_14_010037","N2006_11_11_220751","N2006_11_11_013125","N2006_11_11_010308","N2006_11_11_005720","N2006_11_08_233131","N2006_11_08_220332","N2006_11_07_011225","N0_20061031_BETA","start"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-35269.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}