{"id":"CVE-2022-30785","details":"A file handle created in fuse_lib_opendir, and later used in fuse_lib_readdir, enables arbitrary memory read and write operations in NTFS-3G through 2021.8.22 when using libfuse-lite.","modified":"2026-03-20T12:02:21.978583Z","published":"2022-05-26T16:15:08.937Z","related":["GHSA-6mv4-4v73-xw58","MGASA-2022-0385","SUSE-SU-2022:2835-1","SUSE-SU-2022:2836-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7JPX6OUCQKZX4PN5DQPVDUFZCOOZUX7Z/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UEXHDCUSLJD2HSPMAAVZ5AWMPUOG6UI7/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECDCISL24TYH4CTDFCUVF24WAKRSYF7F/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FAXFYIJWT5SHHRNPOJETM77EIMJ6ZP6I/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2022/06/07/4"},{"type":"ADVISORY","url":"https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5160"},{"type":"ADVISORY","url":"https://github.com/tuxera/ntfs-3g/releases"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/06/msg00017.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202301-01"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tuxera/ntfs-3g","events":[{"introduced":"0"},{"last_affected":"31ac7e4f0fc07beeca455eba6a8f02abd7e4d76f"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2021.8.22"}]}}],"versions":["2011_3_26","2014.2.15","2015.3.13","2015.3.14","2015.3.5","2016.2.15","2016.2.22","2017.2.15","2017.3.23","2021.5.19","2021.8.14","2021.8.22","N0_20061031_BETA","N0_20061115_BETA","N0_20061212_BETA","N0_20061218_BETA","N0_20070102_BETA","N0_20070116_BETA","N0_20070118_BETA","N0_20070207_RC1","N1_0","N1_1004","N1_1030","N1_1104","N1_1120","N1_2121_RC","N1_2125_RC","N1_2129","N1_2216","N1_2310","N1_2412","N1_2506","N1_2531","N1_2712","N1_2812","N1_2918","N1_2926_RC","N1_320_RC","N1_328","N1_411_RC","N1_416","N1_417","N1_5012","N1_5130","N1_516","N1_5222_RC","N1_612_RC","N1_616","N1_710","N1_810","N1_826","N1_910_RC","N1_913","N2006_11_07_011225","N2006_11_08_220332","N2006_11_08_233131","N2006_11_11_005720","N2006_11_11_010308","N2006_11_11_013125","N2006_11_11_220751","N2006_11_14_010037","N2006_11_14_220946","N2008_06_30_143340","N2008_07_12_182213","N2008_07_17_180654","N2008_08_11_185232","N2008_09_18_235522","N2008_09_19_001329","N2008_10_11_154321","N2008_10_22_165845","N2008_12_21_190200","N2009_02_12_002656","N2009_04_02_130250","N2009_10_03_095644","N2009_10_03_104125","N2009_1_1","N2009_2_1","N2009_3_8","N2009_4_4","N2010_10_2","N2010_2_6","N2010_3_6","N2010_5_15","N2010_5_16","N2010_5_22","N2010_6_30_RC","N2010_6_31_RC","N2010_7_23_RC","N2010_8_8","PERMISSION_HANDLING_BASE_20070925","R2009_10_5_RC","start","v2011_10_9_RC","v2011_3_26","v2011_3_28_RC","v2011_4_10","v2011_4_11","v2011_4_12","v2012_1_15","v2013_1_13"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-30785.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}