Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-0358 (GCVE-0-2017-0358)
Vulnerability from cvelistv5
Published
2018-04-13 15:00
Modified
2024-09-17 04:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- privilege escalation
Summary
Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:03:56.587Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201702-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201702-10" }, { "name": "DSA-3780", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3780" }, { "name": "41240", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41240/" }, { "name": "41356", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41356/" }, { "name": "95987", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/95987" }, { "name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ntfs-3g", "vendor": "ntfs-3g", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "credits": [ { "lang": "en", "value": "Jann Horn of Google Project Zero" } ], "datePublic": "2017-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-17T12:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "GLSA-201702-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201702-10" }, { "name": "DSA-3780", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3780" }, { "name": "41240", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41240/" }, { "name": "41356", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41356/" }, { "name": "95987", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/95987" }, { "name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" } ], "source": { "advisory": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2", "discovery": "UNKNOWN" }, "title": "ntfs-3g: Modprobe influence vulnerability via environment variables", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-02-01T05:44:00.000Z", "ID": "CVE-2017-0358", "STATE": "PUBLIC", "TITLE": "ntfs-3g: Modprobe influence vulnerability via environment variables" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ntfs-3g", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "ntfs-3g" } ] } }, "credit": [ { "lang": "eng", "value": "Jann Horn of Google Project Zero" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201702-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201702-10" }, { "name": "DSA-3780", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3780" }, { "name": "41240", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41240/" }, { "name": "41356", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41356/" }, { "name": "95987", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95987" }, { "name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "refsource": "MLIST", "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" } ] }, "source": { "advisory": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2017-0358", "datePublished": "2018-04-13T15:00:00Z", "dateReserved": "2016-11-29T00:00:00", "dateUpdated": "2024-09-17T04:15:15.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-0358\",\"sourceIdentifier\":\"security@debian.org\",\"published\":\"2018-04-13T15:29:00.397\",\"lastModified\":\"2024-11-21T03:02:49.720\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.\"},{\"lang\":\"es\",\"value\":\"Jann Horn, de Google Project Zero, descubri\u00f3 que NTFS-3G, un controlador NTFS de lectura-escritura para FUSE, no limpia en profundidad el entorno antes de ejecutar modprobe con privilegios elevados. Un usuario local puede aprovecharse de este error para escalar privilegios locales a root.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2016.2.22\",\"matchCriteriaId\":\"251D763B-8EFE-4E2C-99D3-B905CF54E117\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2017/02/04/1\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/95987\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201702-10\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-3780\",\"source\":\"security@debian.org\"},{\"url\":\"https://www.exploit-db.com/exploits/41240/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/41356/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2017/02/04/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/95987\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201702-10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-3780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/41240/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/41356/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
suse-su-2018:2070-1
Vulnerability from csaf_suse
Published
2018-07-26 14:37
Modified
2018-07-26 14:37
Summary
Security update for ntfs-3g
Notes
Title of the patch
Security update for ntfs-3g
Description of the patch
This update for ntfs-3g fixes the following issues:
- CVE-2017-0358: Missing sanitization of the environment during a call to
modprobe allowed local users to escalate fo root privilege (bsc#1022500)
Patchnames
sdksp4-ntfs-3g-13703
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ntfs-3g", "title": "Title of the patch" }, { "category": "description", "text": "This update for ntfs-3g fixes the following issues:\n\n- CVE-2017-0358: Missing sanitization of the environment during a call to\n modprobe allowed local users to escalate fo root privilege (bsc#1022500)\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-ntfs-3g-13703", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2070-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:2070-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182070-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:2070-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004316.html" }, { "category": "self", "summary": "SUSE Bug 1022500", "url": "https://bugzilla.suse.com/1022500" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0358 page", "url": "https://www.suse.com/security/cve/CVE-2017-0358/" } ], "title": "Security update for ntfs-3g", "tracking": { "current_release_date": "2018-07-26T14:37:15Z", "generator": { "date": "2018-07-26T14:37:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:2070-1", "initial_release_date": "2018-07-26T14:37:15Z", "revision_history": [ { "date": "2018-07-26T14:37:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ntfs-3g-2011.4.12-0.9.3.1.i586", "product": { "name": "ntfs-3g-2011.4.12-0.9.3.1.i586", "product_id": "ntfs-3g-2011.4.12-0.9.3.1.i586" } }, { "category": "product_version", "name": "ntfs-3g-devel-2011.4.12-0.9.3.1.i586", "product": { "name": "ntfs-3g-devel-2011.4.12-0.9.3.1.i586", "product_id": "ntfs-3g-devel-2011.4.12-0.9.3.1.i586" } }, { "category": "product_version", "name": "ntfsprogs-2011.4.12-0.9.3.1.i586", "product": { "name": "ntfsprogs-2011.4.12-0.9.3.1.i586", "product_id": "ntfsprogs-2011.4.12-0.9.3.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ntfs-3g-2011.4.12-0.9.3.1.ia64", "product": { "name": "ntfs-3g-2011.4.12-0.9.3.1.ia64", "product_id": "ntfs-3g-2011.4.12-0.9.3.1.ia64" } }, { "category": "product_version", "name": "ntfsprogs-2011.4.12-0.9.3.1.ia64", "product": { "name": "ntfsprogs-2011.4.12-0.9.3.1.ia64", "product_id": "ntfsprogs-2011.4.12-0.9.3.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "ntfs-3g-2011.4.12-0.9.3.1.ppc64", "product": { "name": "ntfs-3g-2011.4.12-0.9.3.1.ppc64", "product_id": "ntfs-3g-2011.4.12-0.9.3.1.ppc64" } }, { "category": "product_version", "name": "ntfsprogs-2011.4.12-0.9.3.1.ppc64", "product": { "name": "ntfsprogs-2011.4.12-0.9.3.1.ppc64", "product_id": "ntfsprogs-2011.4.12-0.9.3.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntfs-3g-2011.4.12-0.9.3.1.s390x", "product": { "name": "ntfs-3g-2011.4.12-0.9.3.1.s390x", "product_id": "ntfs-3g-2011.4.12-0.9.3.1.s390x" } }, { "category": "product_version", "name": "ntfsprogs-2011.4.12-0.9.3.1.s390x", "product": { "name": "ntfsprogs-2011.4.12-0.9.3.1.s390x", "product_id": "ntfsprogs-2011.4.12-0.9.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntfs-3g-2011.4.12-0.9.3.1.x86_64", "product": { "name": "ntfs-3g-2011.4.12-0.9.3.1.x86_64", "product_id": "ntfs-3g-2011.4.12-0.9.3.1.x86_64" } }, { "category": "product_version", "name": "ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64", "product": { "name": "ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64", "product_id": "ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64" } }, { "category": "product_version", "name": "ntfsprogs-2011.4.12-0.9.3.1.x86_64", "product": { "name": "ntfsprogs-2011.4.12-0.9.3.1.x86_64", "product_id": "ntfsprogs-2011.4.12-0.9.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntfs-3g-2011.4.12-0.9.3.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.i586" }, "product_reference": "ntfs-3g-2011.4.12-0.9.3.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfs-3g-2011.4.12-0.9.3.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ia64" }, "product_reference": "ntfs-3g-2011.4.12-0.9.3.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfs-3g-2011.4.12-0.9.3.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ppc64" }, "product_reference": "ntfs-3g-2011.4.12-0.9.3.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfs-3g-2011.4.12-0.9.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.s390x" }, "product_reference": "ntfs-3g-2011.4.12-0.9.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfs-3g-2011.4.12-0.9.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.x86_64" }, "product_reference": "ntfs-3g-2011.4.12-0.9.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfs-3g-devel-2011.4.12-0.9.3.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.i586" }, "product_reference": "ntfs-3g-devel-2011.4.12-0.9.3.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64" }, "product_reference": "ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfsprogs-2011.4.12-0.9.3.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.i586" }, "product_reference": "ntfsprogs-2011.4.12-0.9.3.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfsprogs-2011.4.12-0.9.3.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ia64" }, "product_reference": "ntfsprogs-2011.4.12-0.9.3.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfsprogs-2011.4.12-0.9.3.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ppc64" }, "product_reference": "ntfsprogs-2011.4.12-0.9.3.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfsprogs-2011.4.12-0.9.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.s390x" }, "product_reference": "ntfsprogs-2011.4.12-0.9.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfsprogs-2011.4.12-0.9.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.x86_64" }, "product_reference": "ntfsprogs-2011.4.12-0.9.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-0358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0358" } ], "notes": [ { "category": "general", "text": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0358", "url": "https://www.suse.com/security/cve/CVE-2017-0358" }, { "category": "external", "summary": "SUSE Bug 1022500 for CVE-2017-0358", "url": "https://bugzilla.suse.com/1022500" }, { "category": "external", "summary": "SUSE Bug 1022999 for CVE-2017-0358", "url": "https://bugzilla.suse.com/1022999" }, { "category": "external", "summary": "SUSE Bug 1086936 for CVE-2017-0358", "url": "https://bugzilla.suse.com/1086936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.i586", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ia64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ppc64", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-07-26T14:37:15Z", "details": "moderate" } ], "title": "CVE-2017-0358" } ] }
suse-su-2018:3587-2
Vulnerability from csaf_suse
Published
2018-12-13 13:38
Modified
2018-12-13 13:38
Summary
Security update for ntfs-3g_ntfsprogs
Notes
Title of the patch
Security update for ntfs-3g_ntfsprogs
Description of the patch
This update for ntfs-3g_ntfsprogs fixes the following issues:
- CVE-2017-0358: Missing sanitization of the environment during a call to
modprobe allowed local users to escalate fo root privilege (bsc#1022500)
Patchnames
SUSE-SLE-DESKTOP-12-SP4-2018-2543,SUSE-SLE-SDK-12-SP4-2018-2543,SUSE-SLE-WE-12-SP4-2018-2543
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ntfs-3g_ntfsprogs", "title": "Title of the patch" }, { "category": "description", "text": "This update for ntfs-3g_ntfsprogs fixes the following issues:\n\n- CVE-2017-0358: Missing sanitization of the environment during a call to\n modprobe allowed local users to escalate fo root privilege (bsc#1022500)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP4-2018-2543,SUSE-SLE-SDK-12-SP4-2018-2543,SUSE-SLE-WE-12-SP4-2018-2543", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3587-2.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3587-2", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183587-2/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3587-2", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-December/004961.html" }, { "category": "self", "summary": "SUSE Bug 1022500", "url": "https://bugzilla.suse.com/1022500" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0358 page", "url": "https://www.suse.com/security/cve/CVE-2017-0358/" } ], "title": "Security update for ntfs-3g_ntfsprogs", "tracking": { "current_release_date": "2018-12-13T13:38:21Z", "generator": { "date": "2018-12-13T13:38:21Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3587-2", "initial_release_date": "2018-12-13T13:38:21Z", "revision_history": [ { "date": "2018-12-13T13:38:21Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64", "product": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64", "product_id": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64" } }, { "category": "product_version", "name": "libntfs-3g84-2013.1.13-5.3.1.aarch64", "product": { "name": "libntfs-3g84-2013.1.13-5.3.1.aarch64", "product_id": "libntfs-3g84-2013.1.13-5.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le", "product": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le", "product_id": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le" } }, { "category": "product_version", "name": "libntfs-3g84-2013.1.13-5.3.1.ppc64le", "product": { "name": "libntfs-3g84-2013.1.13-5.3.1.ppc64le", "product_id": "libntfs-3g84-2013.1.13-5.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libntfs-3g-devel-2013.1.13-5.3.1.s390x", "product": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.s390x", "product_id": "libntfs-3g-devel-2013.1.13-5.3.1.s390x" } }, { "category": "product_version", "name": "libntfs-3g84-2013.1.13-5.3.1.s390x", "product": { "name": "libntfs-3g84-2013.1.13-5.3.1.s390x", "product_id": "libntfs-3g84-2013.1.13-5.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libntfs-3g84-2013.1.13-5.3.1.x86_64", "product": { "name": "libntfs-3g84-2013.1.13-5.3.1.x86_64", "product_id": "libntfs-3g84-2013.1.13-5.3.1.x86_64" } }, { "category": "product_version", "name": "ntfs-3g-2013.1.13-5.3.1.x86_64", "product": { "name": "ntfs-3g-2013.1.13-5.3.1.x86_64", "product_id": "ntfs-3g-2013.1.13-5.3.1.x86_64" } }, { "category": "product_version", "name": "ntfsprogs-2013.1.13-5.3.1.x86_64", "product": { "name": "ntfsprogs-2013.1.13-5.3.1.x86_64", "product_id": "ntfsprogs-2013.1.13-5.3.1.x86_64" } }, { "category": "product_version", "name": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64", "product": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64", "product_id": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64" }, "product_reference": "libntfs-3g84-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfs-3g-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64" }, "product_reference": "ntfs-3g-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfsprogs-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64" }, "product_reference": "ntfsprogs-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.aarch64" }, "product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le" }, "product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.s390x" }, "product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.x86_64" }, "product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2013.1.13-5.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.aarch64" }, "product_reference": "libntfs-3g84-2013.1.13-5.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2013.1.13-5.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.ppc64le" }, "product_reference": "libntfs-3g84-2013.1.13-5.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2013.1.13-5.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.s390x" }, "product_reference": "libntfs-3g84-2013.1.13-5.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64" }, "product_reference": "libntfs-3g84-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64" }, "product_reference": "libntfs-3g84-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfs-3g-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64" }, "product_reference": "ntfs-3g-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntfsprogs-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64" }, "product_reference": "ntfsprogs-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-0358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0358" } ], "notes": [ { "category": "general", "text": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0358", "url": "https://www.suse.com/security/cve/CVE-2017-0358" }, { "category": "external", "summary": "SUSE Bug 1022500 for CVE-2017-0358", "url": "https://bugzilla.suse.com/1022500" }, { "category": "external", "summary": "SUSE Bug 1022999 for CVE-2017-0358", "url": "https://bugzilla.suse.com/1022999" }, { "category": "external", "summary": "SUSE Bug 1086936 for CVE-2017-0358", "url": "https://bugzilla.suse.com/1086936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-12-13T13:38:21Z", "details": "moderate" } ], "title": "CVE-2017-0358" } ] }
suse-su-2021:2965-1
Vulnerability from csaf_suse
Published
2021-09-07 07:48
Modified
2021-09-07 07:48
Summary
Security update for ntfs-3g_ntfsprogs
Notes
Title of the patch
Security update for ntfs-3g_ntfsprogs
Description of the patch
This update for ntfs-3g_ntfsprogs fixes the following issues:
Update to version 2021.8.22 (bsc#1189720):
* Signalled support of UTIME_OMIT to external libfuse2
* Updated the repository change in the README
* Fixed vulnerability threats caused by maliciously tampered
NTFS partitions
* Security fixes: CVE-2021-33285, CVE-2021-33286, CVE-2021-33287,
CVE-2021-33289, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268,
CVE-2021-35269, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253,
CVE_2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257,
CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261,
CVE-2021-39262, CVE-2021-39263.
Changes in version 2017.3.23:
* Delegated processing of special reparse points to external plugins
* Allowed kernel cacheing by lowntfs-3g when not using Posix ACLs
* Enabled fallback to read-only mount when the volume is hibernated
* Made a full check for whether an extended attribute is allowed
* Moved secaudit and usermap to ntfsprogs (now ntfssecaudit and ntfsusermap)
* Enabled encoding broken UTF-16 into broken UTF-8
* Autoconfigured selecting <sys/sysmacros.h> vs <sys/mkdev>
* Allowed using the full library API on systems without extended attributes support
* Fixed DISABLE_PLUGINS as the condition for not using plugins
* Corrected validation of multi sector transfer protected records
* Denied creating/removing files from $Extend
* Returned the size of locale encoded target as the size of symlinks
Changes in version 2016.2.22:
- Changes to NTFS-3G driver:
- Write as much data as possible in compressed attribute pwrite
- Fixed getting space for making an index non resident
- Alleviated constraints relative to reparse points
- Fixed special case of decompressing a runlist
- Fixed returning the trimming count to fstrim()
- Fixed the range of valid subauthority counts in a SID
- Updated the read-only flag even when the security attribute was cached
- Defended against reusing data from an invalid MFT record
- Simplified NTFS ACLs when group same as owner and same permission as world
- Packed/unpacked st_rdev transported as 32-bits on Solaris 64-bits
- Zero uninitialized bytes before writing compressed data
- Clear the environment when starting mount or umount
- Implemented rewinding a directory in lowntfs-3g
- Use incremental offsets when reading a directory in lowntfs-3g
- Changes to mkntfs:
- Make installing mkntfs /sbin symlinks dependent on ENABLE_MOUNT_HELPER
- Mention the starting sector when it overflows in mkntfs
- Upgraded the upper-case table to same as Windows 7, 8 and 10
- Changes to ntfsresize:
- Fixed relocating the MFT runlists
- Decode the full list of bad clusters
- Fixed resizing an extended bad cluster list
- Changes to ntfsclone:
- Decoded the full list of bad clusters
- Changes to ntfsinfo:
- Displayed reparse point information
- Changes to ntfsdecrypt:
- Fixed DESX decryption
- Changes to ntfswipe:
- Added clarifications about several options to the manual
- New ntfsprogs tool:
- Included ntfsrecover to recover the updates committed by Windows (experimental)
- Overall:
- Made a general cleanup of endianness types for easier checks
Changes in version 2015.3.14:
- ntfs-3g: Fixed inserting a new ACL after wiping out by chkdsk
- ntfs-3g: Fixed Windows-type inheritance
- ntfs-3g: Fixed ignoring the umask mount option when permissions are used
- ntfs-3g: Fixed checking permissions when Posix ACLs are compiled in but not enabled
- ntfs-3g: Disabled option remove_hiberfile on read-only mounts
- ntfs-3g: Implemented an extended attribute to get/set EAs
- ntfs-3g: Avoid full runlist updating in more situations
- ntfs-3g: Update ctime after setting an ACL
- ntfs-3g: Use MFT record 15 for the first extent to MFT:DATA
- ntfs-3g: Ignore the sloppy mount option (-s)
- ntfs-3g: Implemented FITRIM (fstrim) ioctl
- ntfs-3g: Reengineered the compression algorithm
- ntfsprogs: Added manuals for ntfsdecrypt, ntfswipe, ntfstruncate and ntfsfallocate
Patchnames
SUSE-2021-2965,SUSE-SLE-SDK-12-SP5-2021-2965,SUSE-SLE-WE-12-SP5-2021-2965
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ntfs-3g_ntfsprogs", "title": "Title of the patch" }, { "category": "description", "text": "This update for ntfs-3g_ntfsprogs fixes the following issues:\n\nUpdate to version 2021.8.22 (bsc#1189720):\n\n* Signalled support of UTIME_OMIT to external libfuse2\n* Updated the repository change in the README\n* Fixed vulnerability threats caused by maliciously tampered\n NTFS partitions\n* Security fixes: CVE-2021-33285, CVE-2021-33286, CVE-2021-33287,\n CVE-2021-33289, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268,\n CVE-2021-35269, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253,\n CVE_2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257,\n CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261,\n CVE-2021-39262, CVE-2021-39263.\n\nChanges in version 2017.3.23:\n\n* Delegated processing of special reparse points to external plugins\n* Allowed kernel cacheing by lowntfs-3g when not using Posix ACLs\n* Enabled fallback to read-only mount when the volume is hibernated\n* Made a full check for whether an extended attribute is allowed\n* Moved secaudit and usermap to ntfsprogs (now ntfssecaudit and ntfsusermap)\n* Enabled encoding broken UTF-16 into broken UTF-8\n* Autoconfigured selecting \u003csys/sysmacros.h\u003e vs \u003csys/mkdev\u003e\n* Allowed using the full library API on systems without extended attributes support\n* Fixed DISABLE_PLUGINS as the condition for not using plugins\n* Corrected validation of multi sector transfer protected records\n* Denied creating/removing files from $Extend\n* Returned the size of locale encoded target as the size of symlinks\n\nChanges in version 2016.2.22:\n\n- Changes to NTFS-3G driver:\n\n - Write as much data as possible in compressed attribute pwrite\n - Fixed getting space for making an index non resident\n - Alleviated constraints relative to reparse points\n - Fixed special case of decompressing a runlist\n - Fixed returning the trimming count to fstrim()\n - Fixed the range of valid subauthority counts in a SID\n - Updated the read-only flag even when the security attribute was cached\n - Defended against reusing data from an invalid MFT record\n - Simplified NTFS ACLs when group same as owner and same permission as world\n - Packed/unpacked st_rdev transported as 32-bits on Solaris 64-bits\n - Zero uninitialized bytes before writing compressed data\n - Clear the environment when starting mount or umount\n - Implemented rewinding a directory in lowntfs-3g\n - Use incremental offsets when reading a directory in lowntfs-3g\n \n- Changes to mkntfs:\n\n - Make installing mkntfs /sbin symlinks dependent on ENABLE_MOUNT_HELPER\n - Mention the starting sector when it overflows in mkntfs\n - Upgraded the upper-case table to same as Windows 7, 8 and 10\n\n- Changes to ntfsresize:\n\n - Fixed relocating the MFT runlists\n - Decode the full list of bad clusters\n - Fixed resizing an extended bad cluster list\n\n- Changes to ntfsclone:\n\n - Decoded the full list of bad clusters\n\n- Changes to ntfsinfo:\n\n - Displayed reparse point information\n\n- Changes to ntfsdecrypt:\n\n - Fixed DESX decryption\n\n- Changes to ntfswipe:\n\n - Added clarifications about several options to the manual\n\n- New ntfsprogs tool:\n\n - Included ntfsrecover to recover the updates committed by Windows (experimental)\n\n- Overall:\n - Made a general cleanup of endianness types for easier checks\n\nChanges in version 2015.3.14:\n\n- ntfs-3g: Fixed inserting a new ACL after wiping out by chkdsk\n- ntfs-3g: Fixed Windows-type inheritance\n- ntfs-3g: Fixed ignoring the umask mount option when permissions are used\n- ntfs-3g: Fixed checking permissions when Posix ACLs are compiled in but not enabled\n- ntfs-3g: Disabled option remove_hiberfile on read-only mounts\n- ntfs-3g: Implemented an extended attribute to get/set EAs\n- ntfs-3g: Avoid full runlist updating in more situations\n- ntfs-3g: Update ctime after setting an ACL\n- ntfs-3g: Use MFT record 15 for the first extent to MFT:DATA\n- ntfs-3g: Ignore the sloppy mount option (-s)\n- ntfs-3g: Implemented FITRIM (fstrim) ioctl\n- ntfs-3g: Reengineered the compression algorithm\n- ntfsprogs: Added manuals for ntfsdecrypt, ntfswipe, ntfstruncate and ntfsfallocate\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2021-2965,SUSE-SLE-SDK-12-SP5-2021-2965,SUSE-SLE-WE-12-SP5-2021-2965", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2965-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2021:2965-1", "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212965-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2021:2965-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html" }, { "category": "self", "summary": "SUSE Bug 1189720", "url": "https://bugzilla.suse.com/1189720" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0358 page", "url": "https://www.suse.com/security/cve/CVE-2017-0358/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9755 page", "url": "https://www.suse.com/security/cve/CVE-2019-9755/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33285 page", "url": "https://www.suse.com/security/cve/CVE-2021-33285/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33286 page", "url": "https://www.suse.com/security/cve/CVE-2021-33286/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33287 page", "url": "https://www.suse.com/security/cve/CVE-2021-33287/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33289 page", "url": "https://www.suse.com/security/cve/CVE-2021-33289/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-35266 page", "url": "https://www.suse.com/security/cve/CVE-2021-35266/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-35267 page", "url": "https://www.suse.com/security/cve/CVE-2021-35267/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-35268 page", "url": "https://www.suse.com/security/cve/CVE-2021-35268/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-35269 page", "url": "https://www.suse.com/security/cve/CVE-2021-35269/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39251 page", "url": "https://www.suse.com/security/cve/CVE-2021-39251/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39252 page", "url": "https://www.suse.com/security/cve/CVE-2021-39252/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39253 page", "url": "https://www.suse.com/security/cve/CVE-2021-39253/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39255 page", "url": "https://www.suse.com/security/cve/CVE-2021-39255/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39256 page", "url": "https://www.suse.com/security/cve/CVE-2021-39256/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39257 page", "url": "https://www.suse.com/security/cve/CVE-2021-39257/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39258 page", "url": "https://www.suse.com/security/cve/CVE-2021-39258/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39259 page", "url": "https://www.suse.com/security/cve/CVE-2021-39259/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39260 page", "url": "https://www.suse.com/security/cve/CVE-2021-39260/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39261 page", "url": "https://www.suse.com/security/cve/CVE-2021-39261/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39262 page", "url": "https://www.suse.com/security/cve/CVE-2021-39262/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-39263 page", "url": "https://www.suse.com/security/cve/CVE-2021-39263/" } ], "title": "Security update for ntfs-3g_ntfsprogs", "tracking": { "current_release_date": "2021-09-07T07:48:15Z", "generator": { "date": "2021-09-07T07:48:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2021:2965-1", "initial_release_date": "2021-09-07T07:48:15Z", "revision_history": [ { "date": "2021-09-07T07:48:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "product": { "name": "libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "product_id": "libntfs-3g-devel-2021.8.22-5.9.1.aarch64" } }, { "category": "product_version", "name": "libntfs-3g84-2021.8.22-5.9.1.aarch64", "product": { "name": "libntfs-3g84-2021.8.22-5.9.1.aarch64", "product_id": "libntfs-3g84-2021.8.22-5.9.1.aarch64" } }, { "category": "product_version", "name": "ntfs-3g-2021.8.22-5.9.1.aarch64", "product": { "name": "ntfs-3g-2021.8.22-5.9.1.aarch64", "product_id": "ntfs-3g-2021.8.22-5.9.1.aarch64" } }, { "category": "product_version", "name": "ntfsprogs-2021.8.22-5.9.1.aarch64", "product": { "name": "ntfsprogs-2021.8.22-5.9.1.aarch64", "product_id": "ntfsprogs-2021.8.22-5.9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libntfs-3g-devel-2021.8.22-5.9.1.i586", "product": { "name": "libntfs-3g-devel-2021.8.22-5.9.1.i586", "product_id": "libntfs-3g-devel-2021.8.22-5.9.1.i586" } }, { "category": "product_version", "name": "libntfs-3g84-2021.8.22-5.9.1.i586", "product": { "name": "libntfs-3g84-2021.8.22-5.9.1.i586", "product_id": "libntfs-3g84-2021.8.22-5.9.1.i586" } }, { "category": "product_version", "name": "ntfs-3g-2021.8.22-5.9.1.i586", "product": { "name": "ntfs-3g-2021.8.22-5.9.1.i586", "product_id": "ntfs-3g-2021.8.22-5.9.1.i586" } }, { "category": "product_version", "name": "ntfsprogs-2021.8.22-5.9.1.i586", "product": { "name": "ntfsprogs-2021.8.22-5.9.1.i586", "product_id": "ntfsprogs-2021.8.22-5.9.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "product": { "name": "libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "product_id": "libntfs-3g-devel-2021.8.22-5.9.1.ppc64le" } }, { "category": "product_version", "name": "libntfs-3g84-2021.8.22-5.9.1.ppc64le", "product": { "name": "libntfs-3g84-2021.8.22-5.9.1.ppc64le", "product_id": "libntfs-3g84-2021.8.22-5.9.1.ppc64le" } }, { "category": "product_version", "name": "ntfs-3g-2021.8.22-5.9.1.ppc64le", "product": { "name": "ntfs-3g-2021.8.22-5.9.1.ppc64le", "product_id": "ntfs-3g-2021.8.22-5.9.1.ppc64le" } }, { "category": "product_version", "name": "ntfsprogs-2021.8.22-5.9.1.ppc64le", "product": { "name": "ntfsprogs-2021.8.22-5.9.1.ppc64le", "product_id": "ntfsprogs-2021.8.22-5.9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libntfs-3g-devel-2021.8.22-5.9.1.s390", "product": { "name": "libntfs-3g-devel-2021.8.22-5.9.1.s390", "product_id": "libntfs-3g-devel-2021.8.22-5.9.1.s390" } }, { "category": "product_version", "name": "libntfs-3g84-2021.8.22-5.9.1.s390", "product": { "name": "libntfs-3g84-2021.8.22-5.9.1.s390", "product_id": "libntfs-3g84-2021.8.22-5.9.1.s390" } }, { "category": "product_version", "name": "ntfs-3g-2021.8.22-5.9.1.s390", "product": { "name": "ntfs-3g-2021.8.22-5.9.1.s390", "product_id": "ntfs-3g-2021.8.22-5.9.1.s390" } }, { "category": "product_version", "name": "ntfsprogs-2021.8.22-5.9.1.s390", "product": { "name": "ntfsprogs-2021.8.22-5.9.1.s390", "product_id": "ntfsprogs-2021.8.22-5.9.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libntfs-3g-devel-2021.8.22-5.9.1.s390x", "product": { "name": "libntfs-3g-devel-2021.8.22-5.9.1.s390x", "product_id": "libntfs-3g-devel-2021.8.22-5.9.1.s390x" } }, { "category": "product_version", "name": "libntfs-3g84-2021.8.22-5.9.1.s390x", "product": { "name": "libntfs-3g84-2021.8.22-5.9.1.s390x", "product_id": "libntfs-3g84-2021.8.22-5.9.1.s390x" } }, { "category": "product_version", "name": "ntfs-3g-2021.8.22-5.9.1.s390x", "product": { "name": "ntfs-3g-2021.8.22-5.9.1.s390x", "product_id": "ntfs-3g-2021.8.22-5.9.1.s390x" } }, { "category": "product_version", "name": "ntfsprogs-2021.8.22-5.9.1.s390x", "product": { "name": "ntfsprogs-2021.8.22-5.9.1.s390x", "product_id": "ntfsprogs-2021.8.22-5.9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "product": { "name": "libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "product_id": "libntfs-3g-devel-2021.8.22-5.9.1.x86_64" } }, { "category": "product_version", "name": "libntfs-3g84-2021.8.22-5.9.1.x86_64", "product": { "name": "libntfs-3g84-2021.8.22-5.9.1.x86_64", "product_id": "libntfs-3g84-2021.8.22-5.9.1.x86_64" } }, { "category": "product_version", "name": "ntfs-3g-2021.8.22-5.9.1.x86_64", "product": { "name": "ntfs-3g-2021.8.22-5.9.1.x86_64", "product_id": "ntfs-3g-2021.8.22-5.9.1.x86_64" } }, { "category": "product_version", "name": "ntfsprogs-2021.8.22-5.9.1.x86_64", "product": { "name": "ntfsprogs-2021.8.22-5.9.1.x86_64", "product_id": "ntfsprogs-2021.8.22-5.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g-devel-2021.8.22-5.9.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64" }, "product_reference": "libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g-devel-2021.8.22-5.9.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le" }, "product_reference": "libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g-devel-2021.8.22-5.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x" }, "product_reference": "libntfs-3g-devel-2021.8.22-5.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g-devel-2021.8.22-5.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64" }, "product_reference": "libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2021.8.22-5.9.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64" }, "product_reference": "libntfs-3g84-2021.8.22-5.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2021.8.22-5.9.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le" }, "product_reference": "libntfs-3g84-2021.8.22-5.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2021.8.22-5.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x" }, "product_reference": "libntfs-3g84-2021.8.22-5.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2021.8.22-5.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64" }, "product_reference": "libntfs-3g84-2021.8.22-5.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2021.8.22-5.9.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64" }, "product_reference": "libntfs-3g84-2021.8.22-5.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ntfs-3g-2021.8.22-5.9.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64" }, "product_reference": "ntfs-3g-2021.8.22-5.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ntfsprogs-2021.8.22-5.9.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" }, "product_reference": "ntfsprogs-2021.8.22-5.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-0358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0358" } ], "notes": [ { "category": "general", "text": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0358", "url": "https://www.suse.com/security/cve/CVE-2017-0358" }, { "category": "external", "summary": "SUSE Bug 1022500 for CVE-2017-0358", "url": "https://bugzilla.suse.com/1022500" }, { "category": "external", "summary": "SUSE Bug 1022999 for CVE-2017-0358", "url": "https://bugzilla.suse.com/1022999" }, { "category": "external", "summary": "SUSE Bug 1086936 for CVE-2017-0358", "url": "https://bugzilla.suse.com/1086936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "moderate" } ], "title": "CVE-2017-0358" }, { "cve": "CVE-2019-9755", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9755" } ], "notes": [ { "category": "general", "text": "An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9755", "url": "https://www.suse.com/security/cve/CVE-2019-9755" }, { "category": "external", "summary": "SUSE Bug 1130165 for CVE-2019-9755", "url": "https://bugzilla.suse.com/1130165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "moderate" } ], "title": "CVE-2019-9755" }, { "cve": "CVE-2021-33285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33285" } ], "notes": [ { "category": "general", "text": "In NTFS-3G versions \u003c 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the \"bytes_in_use\" field should be less than the \"bytes_allocated\" field. When it is not, the parsing of the records proceeds into the wild.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33285", "url": "https://www.suse.com/security/cve/CVE-2021-33285" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-33285", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-33285" }, { "cve": "CVE-2021-33286", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33286" } ], "notes": [ { "category": "general", "text": "In NTFS-3G versions \u003c 2021.8.22, when a specially crafted unicode string is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33286", "url": "https://www.suse.com/security/cve/CVE-2021-33286" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-33286", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-33286" }, { "cve": "CVE-2021-33287", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33287" } ], "notes": [ { "category": "general", "text": "In NTFS-3G versions \u003c 2021.8.22, when specially crafted NTFS attributes are read in the function ntfs_attr_pread_i, a heap buffer overflow can occur and allow for writing to arbitrary memory or denial of service of the application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33287", "url": "https://www.suse.com/security/cve/CVE-2021-33287" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-33287", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-33287" }, { "cve": "CVE-2021-33289", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33289" } ], "notes": [ { "category": "general", "text": "In NTFS-3G versions \u003c 2021.8.22, when a specially crafted MFT section is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33289", "url": "https://www.suse.com/security/cve/CVE-2021-33289" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-33289", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-33289" }, { "cve": "CVE-2021-35266", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-35266" } ], "notes": [ { "category": "general", "text": "In NTFS-3G versions \u003c 2021.8.22, when a specially crafted NTFS inode pathname is supplied in an NTFS image a heap buffer overflow can occur resulting in memory disclosure, denial of service and even code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-35266", "url": "https://www.suse.com/security/cve/CVE-2021-35266" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-35266", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-35266" }, { "cve": "CVE-2021-35267", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-35267" } ], "notes": [ { "category": "general", "text": "NTFS-3G versions \u003c 2021.8.22, a stack buffer overflow can occur when correcting differences in the MFT and MFTMirror allowing for code execution or escalation of privileges when setuid-root.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-35267", "url": "https://www.suse.com/security/cve/CVE-2021-35267" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-35267", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-35267" }, { "cve": "CVE-2021-35268", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-35268" } ], "notes": [ { "category": "general", "text": "In NTFS-3G versions \u003c 2021.8.22, when a specially crafted NTFS inode is loaded in the function ntfs_inode_real_open, a heap buffer overflow can occur allowing for code execution and escalation of privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-35268", "url": "https://www.suse.com/security/cve/CVE-2021-35268" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-35268", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-35268" }, { "cve": "CVE-2021-35269", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-35269" } ], "notes": [ { "category": "general", "text": "NTFS-3G versions \u003c 2021.8.22, when a specially crafted NTFS attribute from the MFT is setup in the function ntfs_attr_setup_flag, a heap buffer overflow can occur allowing for code execution and escalation of privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-35269", "url": "https://www.suse.com/security/cve/CVE-2021-35269" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-35269", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-35269" }, { "cve": "CVE-2021-39251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39251" } ], "notes": [ { "category": "general", "text": "A crafted NTFS image can cause a NULL pointer dereference in ntfs_extent_inode_open in NTFS-3G \u003c 2021.8.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39251", "url": "https://www.suse.com/security/cve/CVE-2021-39251" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-39251", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-39251" }, { "cve": "CVE-2021-39252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39252" } ], "notes": [ { "category": "general", "text": "A crafted NTFS image can cause an out-of-bounds read in ntfs_ie_lookup in NTFS-3G \u003c 2021.8.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39252", "url": "https://www.suse.com/security/cve/CVE-2021-39252" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-39252", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-39252" }, { "cve": "CVE-2021-39253", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39253" } ], "notes": [ { "category": "general", "text": "A crafted NTFS image can cause an out-of-bounds read in ntfs_runlists_merge_i in NTFS-3G \u003c 2021.8.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39253", "url": "https://www.suse.com/security/cve/CVE-2021-39253" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-39253", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-39253" }, { "cve": "CVE-2021-39255", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39255" } ], "notes": [ { "category": "general", "text": "A crafted NTFS image can trigger an out-of-bounds read, caused by an invalid attribute in ntfs_attr_find_in_attrdef, in NTFS-3G \u003c 2021.8.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39255", "url": "https://www.suse.com/security/cve/CVE-2021-39255" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-39255", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-39255" }, { "cve": "CVE-2021-39256", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39256" } ], "notes": [ { "category": "general", "text": "A crafted NTFS image can cause a heap-based buffer overflow in ntfs_inode_lookup_by_name in NTFS-3G \u003c 2021.8.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39256", "url": "https://www.suse.com/security/cve/CVE-2021-39256" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-39256", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-39256" }, { "cve": "CVE-2021-39257", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39257" } ], "notes": [ { "category": "general", "text": "A crafted NTFS image with an unallocated bitmap can lead to a endless recursive function call chain (starting from ntfs_attr_pwrite), causing stack consumption in NTFS-3G \u003c 2021.8.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39257", "url": "https://www.suse.com/security/cve/CVE-2021-39257" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-39257", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-39257" }, { "cve": "CVE-2021-39258", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39258" } ], "notes": [ { "category": "general", "text": "A crafted NTFS image can cause out-of-bounds reads in ntfs_attr_find and ntfs_external_attr_find in NTFS-3G \u003c 2021.8.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39258", "url": "https://www.suse.com/security/cve/CVE-2021-39258" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-39258", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-39258" }, { "cve": "CVE-2021-39259", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39259" } ], "notes": [ { "category": "general", "text": "A crafted NTFS image can trigger an out-of-bounds access, caused by an unsanitized attribute length in ntfs_inode_lookup_by_name, in NTFS-3G \u003c 2021.8.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39259", "url": "https://www.suse.com/security/cve/CVE-2021-39259" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-39259", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-39259" }, { "cve": "CVE-2021-39260", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39260" } ], "notes": [ { "category": "general", "text": "A crafted NTFS image can cause an out-of-bounds access in ntfs_inode_sync_standard_information in NTFS-3G \u003c 2021.8.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39260", "url": "https://www.suse.com/security/cve/CVE-2021-39260" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-39260", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-39260" }, { "cve": "CVE-2021-39261", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39261" } ], "notes": [ { "category": "general", "text": "A crafted NTFS image can cause a heap-based buffer overflow in ntfs_compressed_pwrite in NTFS-3G \u003c 2021.8.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39261", "url": "https://www.suse.com/security/cve/CVE-2021-39261" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-39261", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-39261" }, { "cve": "CVE-2021-39262", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39262" } ], "notes": [ { "category": "general", "text": "A crafted NTFS image can cause an out-of-bounds access in ntfs_decompress in NTFS-3G \u003c 2021.8.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39262", "url": "https://www.suse.com/security/cve/CVE-2021-39262" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-39262", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-39262" }, { "cve": "CVE-2021-39263", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-39263" } ], "notes": [ { "category": "general", "text": "A crafted NTFS image can trigger a heap-based buffer overflow, caused by an unsanitized attribute in ntfs_get_attribute_value, in NTFS-3G \u003c 2021.8.22.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-39263", "url": "https://www.suse.com/security/cve/CVE-2021-39263" }, { "category": "external", "summary": "SUSE Bug 1189720 for CVE-2021-39263", "url": "https://bugzilla.suse.com/1189720" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-09-07T07:48:15Z", "details": "important" } ], "title": "CVE-2021-39263" } ] }
suse-su-2018:3587-1
Vulnerability from csaf_suse
Published
2018-10-31 09:49
Modified
2018-10-31 09:49
Summary
Security update for ntfs-3g_ntfsprogs
Notes
Title of the patch
Security update for ntfs-3g_ntfsprogs
Description of the patch
This update for ntfs-3g_ntfsprogs fixes the following issues:
- CVE-2017-0358: Missing sanitization of the environment during a call to
modprobe allowed local users to escalate fo root privilege (bsc#1022500)
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2018-2543,SUSE-SLE-SDK-12-SP3-2018-2543,SUSE-SLE-WE-12-SP3-2018-2543
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ntfs-3g_ntfsprogs", "title": "Title of the patch" }, { "category": "description", "text": "This update for ntfs-3g_ntfsprogs fixes the following issues:\n\n- CVE-2017-0358: Missing sanitization of the environment during a call to\n modprobe allowed local users to escalate fo root privilege (bsc#1022500)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP3-2018-2543,SUSE-SLE-SDK-12-SP3-2018-2543,SUSE-SLE-WE-12-SP3-2018-2543", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3587-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:3587-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183587-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:3587-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004816.html" }, { "category": "self", "summary": "SUSE Bug 1022500", "url": "https://bugzilla.suse.com/1022500" }, { "category": "self", "summary": "SUSE CVE CVE-2017-0358 page", "url": "https://www.suse.com/security/cve/CVE-2017-0358/" } ], "title": "Security update for ntfs-3g_ntfsprogs", "tracking": { "current_release_date": "2018-10-31T09:49:46Z", "generator": { "date": "2018-10-31T09:49:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:3587-1", "initial_release_date": "2018-10-31T09:49:46Z", "revision_history": [ { "date": "2018-10-31T09:49:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64", "product": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64", "product_id": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64" } }, { "category": "product_version", "name": "libntfs-3g84-2013.1.13-5.3.1.aarch64", "product": { "name": "libntfs-3g84-2013.1.13-5.3.1.aarch64", "product_id": "libntfs-3g84-2013.1.13-5.3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le", "product": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le", "product_id": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le" } }, { "category": "product_version", "name": "libntfs-3g84-2013.1.13-5.3.1.ppc64le", "product": { "name": "libntfs-3g84-2013.1.13-5.3.1.ppc64le", "product_id": "libntfs-3g84-2013.1.13-5.3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libntfs-3g-devel-2013.1.13-5.3.1.s390x", "product": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.s390x", "product_id": "libntfs-3g-devel-2013.1.13-5.3.1.s390x" } }, { "category": "product_version", "name": "libntfs-3g84-2013.1.13-5.3.1.s390x", "product": { "name": "libntfs-3g84-2013.1.13-5.3.1.s390x", "product_id": "libntfs-3g84-2013.1.13-5.3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libntfs-3g84-2013.1.13-5.3.1.x86_64", "product": { "name": "libntfs-3g84-2013.1.13-5.3.1.x86_64", "product_id": "libntfs-3g84-2013.1.13-5.3.1.x86_64" } }, { "category": "product_version", "name": "ntfs-3g-2013.1.13-5.3.1.x86_64", "product": { "name": "ntfs-3g-2013.1.13-5.3.1.x86_64", "product_id": "ntfs-3g-2013.1.13-5.3.1.x86_64" } }, { "category": "product_version", "name": "ntfsprogs-2013.1.13-5.3.1.x86_64", "product": { "name": "ntfsprogs-2013.1.13-5.3.1.x86_64", "product_id": "ntfsprogs-2013.1.13-5.3.1.x86_64" } }, { "category": "product_version", "name": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64", "product": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64", "product_id": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64" }, "product_reference": "libntfs-3g84-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ntfs-3g-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64" }, "product_reference": "ntfs-3g-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ntfsprogs-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64" }, "product_reference": "ntfsprogs-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.aarch64" }, "product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le" }, "product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.s390x" }, "product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.x86_64" }, "product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2013.1.13-5.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.aarch64" }, "product_reference": "libntfs-3g84-2013.1.13-5.3.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2013.1.13-5.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.ppc64le" }, "product_reference": "libntfs-3g84-2013.1.13-5.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2013.1.13-5.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.s390x" }, "product_reference": "libntfs-3g84-2013.1.13-5.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64" }, "product_reference": "libntfs-3g84-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libntfs-3g84-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64" }, "product_reference": "libntfs-3g84-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ntfs-3g-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64" }, "product_reference": "ntfs-3g-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ntfsprogs-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64" }, "product_reference": "ntfsprogs-2013.1.13-5.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-0358", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-0358" } ], "notes": [ { "category": "general", "text": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-0358", "url": "https://www.suse.com/security/cve/CVE-2017-0358" }, { "category": "external", "summary": "SUSE Bug 1022500 for CVE-2017-0358", "url": "https://bugzilla.suse.com/1022500" }, { "category": "external", "summary": "SUSE Bug 1022999 for CVE-2017-0358", "url": "https://bugzilla.suse.com/1022999" }, { "category": "external", "summary": "SUSE Bug 1086936 for CVE-2017-0358", "url": "https://bugzilla.suse.com/1086936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-10-31T09:49:46Z", "details": "moderate" } ], "title": "CVE-2017-0358" } ] }
gsd-2017-0358
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-0358", "description": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.", "id": "GSD-2017-0358", "references": [ "https://www.suse.com/security/cve/CVE-2017-0358.html", "https://www.debian.org/security/2017/dsa-3780", "https://ubuntu.com/security/CVE-2017-0358", "https://packetstormsecurity.com/files/cve/CVE-2017-0358" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-0358" ], "details": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.", "id": "GSD-2017-0358", "modified": "2023-12-13T01:20:59.522104Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "DATE_PUBLIC": "2017-02-01T05:44:00.000Z", "ID": "CVE-2017-0358", "STATE": "PUBLIC", "TITLE": "ntfs-3g: Modprobe influence vulnerability via environment variables" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ntfs-3g", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "ntfs-3g" } ] } }, "credit": [ { "lang": "eng", "value": "Jann Horn of Google Project Zero" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201702-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201702-10" }, { "name": "DSA-3780", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3780" }, { "name": "41240", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41240/" }, { "name": "41356", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41356/" }, { "name": "95987", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95987" }, { "name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "refsource": "MLIST", "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" } ] }, "source": { "advisory": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2", "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2016.2.22", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2017-0358" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-269" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" }, { "name": "41356", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41356/" }, { "name": "41240", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41240/" }, { "name": "GLSA-201702-10", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201702-10" }, { "name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables", "refsource": "MLIST", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "name": "95987", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95987" }, { "name": "DSA-3780", "refsource": "DEBIAN", "tags": [], "url": "https://www.debian.org/security/2017/dsa-3780" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2019-10-03T00:03Z", "publishedDate": "2018-04-13T15:29Z" } } }
ghsa-vghw-r4fc-pgpf
Vulnerability from github
Published
2022-05-13 01:39
Modified
2022-05-13 01:39
Severity ?
VLAI Severity ?
Details
Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
{ "affected": [], "aliases": [ "CVE-2017-0358" ], "database_specific": { "cwe_ids": [ "CWE-269" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-04-13T15:29:00Z", "severity": "HIGH" }, "details": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.", "id": "GHSA-vghw-r4fc-pgpf", "modified": "2022-05-13T01:39:57Z", "published": "2022-05-13T01:39:57Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0358" }, { "type": "WEB", "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201702-10" }, { "type": "WEB", "url": "https://www.debian.org/security/2017/dsa-3780" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/41240" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/41356" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/95987" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2017-0358
Vulnerability from fkie_nvd
Published
2018-04-13 15:29
Modified
2024-11-21 03:02
Severity ?
Summary
Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
References
▶ | URL | Tags | |
---|---|---|---|
security@debian.org | http://www.openwall.com/lists/oss-security/2017/02/04/1 | Mailing List, Third Party Advisory | |
security@debian.org | http://www.securityfocus.com/bid/95987 | Third Party Advisory, VDB Entry | |
security@debian.org | https://marc.info/?l=oss-security&m=148594671929354&w=2 | Exploit, Mailing List, Third Party Advisory | |
security@debian.org | https://security.gentoo.org/glsa/201702-10 | Third Party Advisory | |
security@debian.org | https://www.debian.org/security/2017/dsa-3780 | ||
security@debian.org | https://www.exploit-db.com/exploits/41240/ | Exploit, Third Party Advisory, VDB Entry | |
security@debian.org | https://www.exploit-db.com/exploits/41356/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2017/02/04/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/95987 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://marc.info/?l=oss-security&m=148594671929354&w=2 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201702-10 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2017/dsa-3780 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/41240/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/41356/ | Exploit, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tuxera | ntfs-3g | * | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*", "matchCriteriaId": "251D763B-8EFE-4E2C-99D3-B905CF54E117", "versionEndIncluding": "2016.2.22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation." }, { "lang": "es", "value": "Jann Horn, de Google Project Zero, descubri\u00f3 que NTFS-3G, un controlador NTFS de lectura-escritura para FUSE, no limpia en profundidad el entorno antes de ejecutar modprobe con privilegios elevados. Un usuario local puede aprovecharse de este error para escalar privilegios locales a root." } ], "id": "CVE-2017-0358", "lastModified": "2024-11-21T03:02:49.720", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-04-13T15:29:00.397", "references": [ { "source": "security@debian.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95987" }, { "source": "security@debian.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "source": "security@debian.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201702-10" }, { "source": "security@debian.org", "url": "https://www.debian.org/security/2017/dsa-3780" }, { "source": "security@debian.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41240/" }, { "source": "security@debian.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41356/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2017/02/04/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95987" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201702-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2017/dsa-3780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41240/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41356/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…