Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-0358 (GCVE-0-2017-0358)
Vulnerability from cvelistv5 – Published: 2018-04-13 15:00 – Updated: 2025-12-04 16:01
VLAI?
EPSS
Summary
Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
Severity ?
7.8 (High)
CWE
- privilege escalation
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
Credits
Jann Horn of Google Project Zero
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T13:03:56.587Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "GLSA-201702-10",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201702-10"
},
{
"name": "DSA-3780",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2017/dsa-3780"
},
{
"name": "41240",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/41240/"
},
{
"name": "41356",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/41356/"
},
{
"name": "95987",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/95987"
},
{
"name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2"
},
{
"name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2017/02/04/1"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2017-0358",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-04T15:59:11.417570Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-04T16:01:26.539Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "ntfs-3g",
"vendor": "ntfs-3g",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Jann Horn of Google Project Zero"
}
],
"datePublic": "2017-02-01T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "privilege escalation",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-12-17T12:57:01.000Z",
"orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
"shortName": "debian"
},
"references": [
{
"name": "GLSA-201702-10",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201702-10"
},
{
"name": "DSA-3780",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2017/dsa-3780"
},
{
"name": "41240",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/41240/"
},
{
"name": "41356",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/41356/"
},
{
"name": "95987",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/95987"
},
{
"name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2"
},
{
"name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2017/02/04/1"
}
],
"source": {
"advisory": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2",
"discovery": "UNKNOWN"
},
"title": "ntfs-3g: Modprobe influence vulnerability via environment variables",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"DATE_PUBLIC": "2017-02-01T05:44:00.000Z",
"ID": "CVE-2017-0358",
"STATE": "PUBLIC",
"TITLE": "ntfs-3g: Modprobe influence vulnerability via environment variables"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ntfs-3g",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "ntfs-3g"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Jann Horn of Google Project Zero"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "privilege escalation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "GLSA-201702-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-10"
},
{
"name": "DSA-3780",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3780"
},
{
"name": "41240",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41240/"
},
{
"name": "41356",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41356/"
},
{
"name": "95987",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95987"
},
{
"name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
"refsource": "MLIST",
"url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2"
},
{
"name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/02/04/1"
}
]
},
"source": {
"advisory": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2",
"discovery": "UNKNOWN"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
"assignerShortName": "debian",
"cveId": "CVE-2017-0358",
"datePublished": "2018-04-13T15:00:00.000Z",
"dateReserved": "2016-11-29T00:00:00.000Z",
"dateUpdated": "2025-12-04T16:01:26.539Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2016.2.22\", \"matchCriteriaId\": \"251D763B-8EFE-4E2C-99D3-B905CF54E117\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.\"}, {\"lang\": \"es\", \"value\": \"Jann Horn, de Google Project Zero, descubri\\u00f3 que NTFS-3G, un controlador NTFS de lectura-escritura para FUSE, no limpia en profundidad el entorno antes de ejecutar modprobe con privilegios elevados. Un usuario local puede aprovecharse de este error para escalar privilegios locales a root.\"}]",
"id": "CVE-2017-0358",
"lastModified": "2024-11-21T03:02:49.720",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-04-13T15:29:00.397",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2017/02/04/1\", \"source\": \"security@debian.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/95987\", \"source\": \"security@debian.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2\", \"source\": \"security@debian.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201702-10\", \"source\": \"security@debian.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2017/dsa-3780\", \"source\": \"security@debian.org\"}, {\"url\": \"https://www.exploit-db.com/exploits/41240/\", \"source\": \"security@debian.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41356/\", \"source\": \"security@debian.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2017/02/04/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/95987\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201702-10\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2017/dsa-3780\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.exploit-db.com/exploits/41240/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41356/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}]",
"sourceIdentifier": "security@debian.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-269\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-0358\",\"sourceIdentifier\":\"security@debian.org\",\"published\":\"2018-04-13T15:29:00.397\",\"lastModified\":\"2025-12-04T16:15:48.560\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.\"},{\"lang\":\"es\",\"value\":\"Jann Horn, de Google Project Zero, descubri\u00f3 que NTFS-3G, un controlador NTFS de lectura-escritura para FUSE, no limpia en profundidad el entorno antes de ejecutar modprobe con privilegios elevados. Un usuario local puede aprovecharse de este error para escalar privilegios locales a root.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2016.2.22\",\"matchCriteriaId\":\"251D763B-8EFE-4E2C-99D3-B905CF54E117\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2017/02/04/1\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/95987\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201702-10\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-3780\",\"source\":\"security@debian.org\"},{\"url\":\"https://www.exploit-db.com/exploits/41240/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/41356/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2017/02/04/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/95987\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201702-10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2017/dsa-3780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/41240/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/41356/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.gentoo.org/glsa/201702-10\", \"name\": \"GLSA-201702-10\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\", \"x_transferred\"]}, {\"url\": \"https://www.debian.org/security/2017/dsa-3780\", \"name\": \"DSA-3780\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41240/\", \"name\": \"41240\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41356/\", \"name\": \"41356\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/95987\", \"name\": \"95987\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2\", \"name\": \"[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2017/02/04/1\", \"name\": \"[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T13:03:56.587Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2017-0358\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-12-04T15:59:11.417570Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-269\", \"description\": \"CWE-269 Improper Privilege Management\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-12-04T16:00:23.559Z\"}}], \"cna\": {\"title\": \"ntfs-3g: Modprobe influence vulnerability via environment variables\", \"source\": {\"advisory\": \"https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2\", \"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"value\": \"Jann Horn of Google Project Zero\"}], \"affected\": [{\"vendor\": \"ntfs-3g\", \"product\": \"ntfs-3g\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2017-02-01T00:00:00.000Z\", \"references\": [{\"url\": \"https://security.gentoo.org/glsa/201702-10\", \"name\": \"GLSA-201702-10\", \"tags\": [\"vendor-advisory\", \"x_refsource_GENTOO\"]}, {\"url\": \"https://www.debian.org/security/2017/dsa-3780\", \"name\": \"DSA-3780\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41240/\", \"name\": \"41240\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41356/\", \"name\": \"41356\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"http://www.securityfocus.com/bid/95987\", \"name\": \"95987\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2\", \"name\": \"[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2017/02/04/1\", \"name\": \"[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"privilege escalation\"}]}], \"providerMetadata\": {\"orgId\": \"79363d38-fa19-49d1-9214-5f28da3f3ac5\", \"shortName\": \"debian\", \"dateUpdated\": \"2018-12-17T12:57:01.000Z\"}, \"x_legacyV4Record\": {\"credit\": [{\"lang\": \"eng\", \"value\": \"Jann Horn of Google Project Zero\"}], \"source\": {\"advisory\": \"https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2\", \"discovery\": \"UNKNOWN\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"ntfs-3g\"}]}, \"vendor_name\": \"ntfs-3g\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://security.gentoo.org/glsa/201702-10\", \"name\": \"GLSA-201702-10\", \"refsource\": \"GENTOO\"}, {\"url\": \"https://www.debian.org/security/2017/dsa-3780\", \"name\": \"DSA-3780\", \"refsource\": \"DEBIAN\"}, {\"url\": \"https://www.exploit-db.com/exploits/41240/\", \"name\": \"41240\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"https://www.exploit-db.com/exploits/41356/\", \"name\": \"41356\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"http://www.securityfocus.com/bid/95987\", \"name\": \"95987\", \"refsource\": \"BID\"}, {\"url\": \"https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2\", \"name\": \"[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables\", \"refsource\": \"MLIST\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2017/02/04/1\", \"name\": \"[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables\", \"refsource\": \"MLIST\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"privilege escalation\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2017-0358\", \"STATE\": \"PUBLIC\", \"TITLE\": \"ntfs-3g: Modprobe influence vulnerability via environment variables\", \"ASSIGNER\": \"security@debian.org\", \"DATE_PUBLIC\": \"2017-02-01T05:44:00.000Z\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2017-0358\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-12-04T16:01:26.539Z\", \"dateReserved\": \"2016-11-29T00:00:00.000Z\", \"assignerOrgId\": \"79363d38-fa19-49d1-9214-5f28da3f3ac5\", \"datePublished\": \"2018-04-13T15:00:00.000Z\", \"assignerShortName\": \"debian\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-VGHW-R4FC-PGPF
Vulnerability from github – Published: 2022-05-13 01:39 – Updated: 2025-12-04 18:30
VLAI?
Details
Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
Severity ?
7.8 (High)
{
"affected": [],
"aliases": [
"CVE-2017-0358"
],
"database_specific": {
"cwe_ids": [
"CWE-269"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-04-13T15:29:00Z",
"severity": "HIGH"
},
"details": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.",
"id": "GHSA-vghw-r4fc-pgpf",
"modified": "2025-12-04T18:30:36Z",
"published": "2022-05-13T01:39:57Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0358"
},
{
"type": "WEB",
"url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201702-10"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2017/dsa-3780"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/41240"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/41356"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2017/02/04/1"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/95987"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2017-0358
Vulnerability from fkie_nvd - Published: 2018-04-13 15:29 - Updated: 2025-12-04 16:15
Severity ?
Summary
Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| tuxera | ntfs-3g | * | |
| debian | debian_linux | 8.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*",
"matchCriteriaId": "251D763B-8EFE-4E2C-99D3-B905CF54E117",
"versionEndIncluding": "2016.2.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation."
},
{
"lang": "es",
"value": "Jann Horn, de Google Project Zero, descubri\u00f3 que NTFS-3G, un controlador NTFS de lectura-escritura para FUSE, no limpia en profundidad el entorno antes de ejecutar modprobe con privilegios elevados. Un usuario local puede aprovecharse de este error para escalar privilegios locales a root."
}
],
"id": "CVE-2017-0358",
"lastModified": "2025-12-04T16:15:48.560",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2018-04-13T15:29:00.397",
"references": [
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2017/02/04/1"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/95987"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201702-10"
},
{
"source": "security@debian.org",
"url": "https://www.debian.org/security/2017/dsa-3780"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/41240/"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/41356/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2017/02/04/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/95987"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201702-10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.debian.org/security/2017/dsa-3780"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/41240/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/41356/"
}
],
"sourceIdentifier": "security@debian.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
SUSE-SU-2021:2965-1
Vulnerability from csaf_suse - Published: 2021-09-07 07:48 - Updated: 2021-09-07 07:48Summary
Security update for ntfs-3g_ntfsprogs
Notes
Title of the patch
Security update for ntfs-3g_ntfsprogs
Description of the patch
This update for ntfs-3g_ntfsprogs fixes the following issues:
Update to version 2021.8.22 (bsc#1189720):
* Signalled support of UTIME_OMIT to external libfuse2
* Updated the repository change in the README
* Fixed vulnerability threats caused by maliciously tampered
NTFS partitions
* Security fixes: CVE-2021-33285, CVE-2021-33286, CVE-2021-33287,
CVE-2021-33289, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268,
CVE-2021-35269, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253,
CVE_2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257,
CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261,
CVE-2021-39262, CVE-2021-39263.
Changes in version 2017.3.23:
* Delegated processing of special reparse points to external plugins
* Allowed kernel cacheing by lowntfs-3g when not using Posix ACLs
* Enabled fallback to read-only mount when the volume is hibernated
* Made a full check for whether an extended attribute is allowed
* Moved secaudit and usermap to ntfsprogs (now ntfssecaudit and ntfsusermap)
* Enabled encoding broken UTF-16 into broken UTF-8
* Autoconfigured selecting <sys/sysmacros.h> vs <sys/mkdev>
* Allowed using the full library API on systems without extended attributes support
* Fixed DISABLE_PLUGINS as the condition for not using plugins
* Corrected validation of multi sector transfer protected records
* Denied creating/removing files from $Extend
* Returned the size of locale encoded target as the size of symlinks
Changes in version 2016.2.22:
- Changes to NTFS-3G driver:
- Write as much data as possible in compressed attribute pwrite
- Fixed getting space for making an index non resident
- Alleviated constraints relative to reparse points
- Fixed special case of decompressing a runlist
- Fixed returning the trimming count to fstrim()
- Fixed the range of valid subauthority counts in a SID
- Updated the read-only flag even when the security attribute was cached
- Defended against reusing data from an invalid MFT record
- Simplified NTFS ACLs when group same as owner and same permission as world
- Packed/unpacked st_rdev transported as 32-bits on Solaris 64-bits
- Zero uninitialized bytes before writing compressed data
- Clear the environment when starting mount or umount
- Implemented rewinding a directory in lowntfs-3g
- Use incremental offsets when reading a directory in lowntfs-3g
- Changes to mkntfs:
- Make installing mkntfs /sbin symlinks dependent on ENABLE_MOUNT_HELPER
- Mention the starting sector when it overflows in mkntfs
- Upgraded the upper-case table to same as Windows 7, 8 and 10
- Changes to ntfsresize:
- Fixed relocating the MFT runlists
- Decode the full list of bad clusters
- Fixed resizing an extended bad cluster list
- Changes to ntfsclone:
- Decoded the full list of bad clusters
- Changes to ntfsinfo:
- Displayed reparse point information
- Changes to ntfsdecrypt:
- Fixed DESX decryption
- Changes to ntfswipe:
- Added clarifications about several options to the manual
- New ntfsprogs tool:
- Included ntfsrecover to recover the updates committed by Windows (experimental)
- Overall:
- Made a general cleanup of endianness types for easier checks
Changes in version 2015.3.14:
- ntfs-3g: Fixed inserting a new ACL after wiping out by chkdsk
- ntfs-3g: Fixed Windows-type inheritance
- ntfs-3g: Fixed ignoring the umask mount option when permissions are used
- ntfs-3g: Fixed checking permissions when Posix ACLs are compiled in but not enabled
- ntfs-3g: Disabled option remove_hiberfile on read-only mounts
- ntfs-3g: Implemented an extended attribute to get/set EAs
- ntfs-3g: Avoid full runlist updating in more situations
- ntfs-3g: Update ctime after setting an ACL
- ntfs-3g: Use MFT record 15 for the first extent to MFT:DATA
- ntfs-3g: Ignore the sloppy mount option (-s)
- ntfs-3g: Implemented FITRIM (fstrim) ioctl
- ntfs-3g: Reengineered the compression algorithm
- ntfsprogs: Added manuals for ntfsdecrypt, ntfswipe, ntfstruncate and ntfsfallocate
Patchnames
SUSE-2021-2965,SUSE-SLE-SDK-12-SP5-2021-2965,SUSE-SLE-WE-12-SP5-2021-2965
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ntfs-3g_ntfsprogs",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ntfs-3g_ntfsprogs fixes the following issues:\n\nUpdate to version 2021.8.22 (bsc#1189720):\n\n* Signalled support of UTIME_OMIT to external libfuse2\n* Updated the repository change in the README\n* Fixed vulnerability threats caused by maliciously tampered\n NTFS partitions\n* Security fixes: CVE-2021-33285, CVE-2021-33286, CVE-2021-33287,\n CVE-2021-33289, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268,\n CVE-2021-35269, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253,\n CVE_2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257,\n CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261,\n CVE-2021-39262, CVE-2021-39263.\n\nChanges in version 2017.3.23:\n\n* Delegated processing of special reparse points to external plugins\n* Allowed kernel cacheing by lowntfs-3g when not using Posix ACLs\n* Enabled fallback to read-only mount when the volume is hibernated\n* Made a full check for whether an extended attribute is allowed\n* Moved secaudit and usermap to ntfsprogs (now ntfssecaudit and ntfsusermap)\n* Enabled encoding broken UTF-16 into broken UTF-8\n* Autoconfigured selecting \u003csys/sysmacros.h\u003e vs \u003csys/mkdev\u003e\n* Allowed using the full library API on systems without extended attributes support\n* Fixed DISABLE_PLUGINS as the condition for not using plugins\n* Corrected validation of multi sector transfer protected records\n* Denied creating/removing files from $Extend\n* Returned the size of locale encoded target as the size of symlinks\n\nChanges in version 2016.2.22:\n\n- Changes to NTFS-3G driver:\n\n - Write as much data as possible in compressed attribute pwrite\n - Fixed getting space for making an index non resident\n - Alleviated constraints relative to reparse points\n - Fixed special case of decompressing a runlist\n - Fixed returning the trimming count to fstrim()\n - Fixed the range of valid subauthority counts in a SID\n - Updated the read-only flag even when the security attribute was cached\n - Defended against reusing data from an invalid MFT record\n - Simplified NTFS ACLs when group same as owner and same permission as world\n - Packed/unpacked st_rdev transported as 32-bits on Solaris 64-bits\n - Zero uninitialized bytes before writing compressed data\n - Clear the environment when starting mount or umount\n - Implemented rewinding a directory in lowntfs-3g\n - Use incremental offsets when reading a directory in lowntfs-3g\n \n- Changes to mkntfs:\n\n - Make installing mkntfs /sbin symlinks dependent on ENABLE_MOUNT_HELPER\n - Mention the starting sector when it overflows in mkntfs\n - Upgraded the upper-case table to same as Windows 7, 8 and 10\n\n- Changes to ntfsresize:\n\n - Fixed relocating the MFT runlists\n - Decode the full list of bad clusters\n - Fixed resizing an extended bad cluster list\n\n- Changes to ntfsclone:\n\n - Decoded the full list of bad clusters\n\n- Changes to ntfsinfo:\n\n - Displayed reparse point information\n\n- Changes to ntfsdecrypt:\n\n - Fixed DESX decryption\n\n- Changes to ntfswipe:\n\n - Added clarifications about several options to the manual\n\n- New ntfsprogs tool:\n\n - Included ntfsrecover to recover the updates committed by Windows (experimental)\n\n- Overall:\n - Made a general cleanup of endianness types for easier checks\n\nChanges in version 2015.3.14:\n\n- ntfs-3g: Fixed inserting a new ACL after wiping out by chkdsk\n- ntfs-3g: Fixed Windows-type inheritance\n- ntfs-3g: Fixed ignoring the umask mount option when permissions are used\n- ntfs-3g: Fixed checking permissions when Posix ACLs are compiled in but not enabled\n- ntfs-3g: Disabled option remove_hiberfile on read-only mounts\n- ntfs-3g: Implemented an extended attribute to get/set EAs\n- ntfs-3g: Avoid full runlist updating in more situations\n- ntfs-3g: Update ctime after setting an ACL\n- ntfs-3g: Use MFT record 15 for the first extent to MFT:DATA\n- ntfs-3g: Ignore the sloppy mount option (-s)\n- ntfs-3g: Implemented FITRIM (fstrim) ioctl\n- ntfs-3g: Reengineered the compression algorithm\n- ntfsprogs: Added manuals for ntfsdecrypt, ntfswipe, ntfstruncate and ntfsfallocate\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2965,SUSE-SLE-SDK-12-SP5-2021-2965,SUSE-SLE-WE-12-SP5-2021-2965",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2965-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2965-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212965-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2965-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009419.html"
},
{
"category": "self",
"summary": "SUSE Bug 1189720",
"url": "https://bugzilla.suse.com/1189720"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-0358 page",
"url": "https://www.suse.com/security/cve/CVE-2017-0358/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9755 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33285 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33286 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33287 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33287/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33289 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35266 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35267 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35267/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35268 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35269 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39251 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39251/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39252 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39253 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39255 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39255/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39256 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39256/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39257 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39257/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39258 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39258/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39259 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39259/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39260 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39260/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39261 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39262 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39262/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39263 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39263/"
}
],
"title": "Security update for ntfs-3g_ntfsprogs",
"tracking": {
"current_release_date": "2021-09-07T07:48:15Z",
"generator": {
"date": "2021-09-07T07:48:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2965-1",
"initial_release_date": "2021-09-07T07:48:15Z",
"revision_history": [
{
"date": "2021-09-07T07:48:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"product": {
"name": "libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"product_id": "libntfs-3g-devel-2021.8.22-5.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "libntfs-3g84-2021.8.22-5.9.1.aarch64",
"product": {
"name": "libntfs-3g84-2021.8.22-5.9.1.aarch64",
"product_id": "libntfs-3g84-2021.8.22-5.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "ntfs-3g-2021.8.22-5.9.1.aarch64",
"product": {
"name": "ntfs-3g-2021.8.22-5.9.1.aarch64",
"product_id": "ntfs-3g-2021.8.22-5.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2021.8.22-5.9.1.aarch64",
"product": {
"name": "ntfsprogs-2021.8.22-5.9.1.aarch64",
"product_id": "ntfsprogs-2021.8.22-5.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g-devel-2021.8.22-5.9.1.i586",
"product": {
"name": "libntfs-3g-devel-2021.8.22-5.9.1.i586",
"product_id": "libntfs-3g-devel-2021.8.22-5.9.1.i586"
}
},
{
"category": "product_version",
"name": "libntfs-3g84-2021.8.22-5.9.1.i586",
"product": {
"name": "libntfs-3g84-2021.8.22-5.9.1.i586",
"product_id": "libntfs-3g84-2021.8.22-5.9.1.i586"
}
},
{
"category": "product_version",
"name": "ntfs-3g-2021.8.22-5.9.1.i586",
"product": {
"name": "ntfs-3g-2021.8.22-5.9.1.i586",
"product_id": "ntfs-3g-2021.8.22-5.9.1.i586"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2021.8.22-5.9.1.i586",
"product": {
"name": "ntfsprogs-2021.8.22-5.9.1.i586",
"product_id": "ntfsprogs-2021.8.22-5.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"product": {
"name": "libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"product_id": "libntfs-3g-devel-2021.8.22-5.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"product": {
"name": "libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"product_id": "libntfs-3g84-2021.8.22-5.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ntfs-3g-2021.8.22-5.9.1.ppc64le",
"product": {
"name": "ntfs-3g-2021.8.22-5.9.1.ppc64le",
"product_id": "ntfs-3g-2021.8.22-5.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2021.8.22-5.9.1.ppc64le",
"product": {
"name": "ntfsprogs-2021.8.22-5.9.1.ppc64le",
"product_id": "ntfsprogs-2021.8.22-5.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g-devel-2021.8.22-5.9.1.s390",
"product": {
"name": "libntfs-3g-devel-2021.8.22-5.9.1.s390",
"product_id": "libntfs-3g-devel-2021.8.22-5.9.1.s390"
}
},
{
"category": "product_version",
"name": "libntfs-3g84-2021.8.22-5.9.1.s390",
"product": {
"name": "libntfs-3g84-2021.8.22-5.9.1.s390",
"product_id": "libntfs-3g84-2021.8.22-5.9.1.s390"
}
},
{
"category": "product_version",
"name": "ntfs-3g-2021.8.22-5.9.1.s390",
"product": {
"name": "ntfs-3g-2021.8.22-5.9.1.s390",
"product_id": "ntfs-3g-2021.8.22-5.9.1.s390"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2021.8.22-5.9.1.s390",
"product": {
"name": "ntfsprogs-2021.8.22-5.9.1.s390",
"product_id": "ntfsprogs-2021.8.22-5.9.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"product": {
"name": "libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"product_id": "libntfs-3g-devel-2021.8.22-5.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libntfs-3g84-2021.8.22-5.9.1.s390x",
"product": {
"name": "libntfs-3g84-2021.8.22-5.9.1.s390x",
"product_id": "libntfs-3g84-2021.8.22-5.9.1.s390x"
}
},
{
"category": "product_version",
"name": "ntfs-3g-2021.8.22-5.9.1.s390x",
"product": {
"name": "ntfs-3g-2021.8.22-5.9.1.s390x",
"product_id": "ntfs-3g-2021.8.22-5.9.1.s390x"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2021.8.22-5.9.1.s390x",
"product": {
"name": "ntfsprogs-2021.8.22-5.9.1.s390x",
"product_id": "ntfsprogs-2021.8.22-5.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"product": {
"name": "libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"product_id": "libntfs-3g-devel-2021.8.22-5.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libntfs-3g84-2021.8.22-5.9.1.x86_64",
"product": {
"name": "libntfs-3g84-2021.8.22-5.9.1.x86_64",
"product_id": "libntfs-3g84-2021.8.22-5.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "ntfs-3g-2021.8.22-5.9.1.x86_64",
"product": {
"name": "ntfs-3g-2021.8.22-5.9.1.x86_64",
"product_id": "ntfs-3g-2021.8.22-5.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2021.8.22-5.9.1.x86_64",
"product": {
"name": "ntfsprogs-2021.8.22-5.9.1.x86_64",
"product_id": "ntfsprogs-2021.8.22-5.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g-devel-2021.8.22-5.9.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64"
},
"product_reference": "libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g-devel-2021.8.22-5.9.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le"
},
"product_reference": "libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g-devel-2021.8.22-5.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x"
},
"product_reference": "libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g-devel-2021.8.22-5.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64"
},
"product_reference": "libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2021.8.22-5.9.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64"
},
"product_reference": "libntfs-3g84-2021.8.22-5.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2021.8.22-5.9.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le"
},
"product_reference": "libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2021.8.22-5.9.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x"
},
"product_reference": "libntfs-3g84-2021.8.22-5.9.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2021.8.22-5.9.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64"
},
"product_reference": "libntfs-3g84-2021.8.22-5.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2021.8.22-5.9.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64"
},
"product_reference": "libntfs-3g84-2021.8.22-5.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfs-3g-2021.8.22-5.9.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64"
},
"product_reference": "ntfs-3g-2021.8.22-5.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfsprogs-2021.8.22-5.9.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
},
"product_reference": "ntfsprogs-2021.8.22-5.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-0358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-0358"
}
],
"notes": [
{
"category": "general",
"text": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-0358",
"url": "https://www.suse.com/security/cve/CVE-2017-0358"
},
{
"category": "external",
"summary": "SUSE Bug 1022500 for CVE-2017-0358",
"url": "https://bugzilla.suse.com/1022500"
},
{
"category": "external",
"summary": "SUSE Bug 1022999 for CVE-2017-0358",
"url": "https://bugzilla.suse.com/1022999"
},
{
"category": "external",
"summary": "SUSE Bug 1086936 for CVE-2017-0358",
"url": "https://bugzilla.suse.com/1086936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2017-0358"
},
{
"cve": "CVE-2019-9755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9755"
}
],
"notes": [
{
"category": "general",
"text": "An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9755",
"url": "https://www.suse.com/security/cve/CVE-2019-9755"
},
{
"category": "external",
"summary": "SUSE Bug 1130165 for CVE-2019-9755",
"url": "https://bugzilla.suse.com/1130165"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "moderate"
}
],
"title": "CVE-2019-9755"
},
{
"cve": "CVE-2021-33285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33285"
}
],
"notes": [
{
"category": "general",
"text": "In NTFS-3G versions \u003c 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the \"bytes_in_use\" field should be less than the \"bytes_allocated\" field. When it is not, the parsing of the records proceeds into the wild.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33285",
"url": "https://www.suse.com/security/cve/CVE-2021-33285"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-33285",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-33285"
},
{
"cve": "CVE-2021-33286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33286"
}
],
"notes": [
{
"category": "general",
"text": "In NTFS-3G versions \u003c 2021.8.22, when a specially crafted unicode string is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33286",
"url": "https://www.suse.com/security/cve/CVE-2021-33286"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-33286",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-33286"
},
{
"cve": "CVE-2021-33287",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33287"
}
],
"notes": [
{
"category": "general",
"text": "In NTFS-3G versions \u003c 2021.8.22, when specially crafted NTFS attributes are read in the function ntfs_attr_pread_i, a heap buffer overflow can occur and allow for writing to arbitrary memory or denial of service of the application.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33287",
"url": "https://www.suse.com/security/cve/CVE-2021-33287"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-33287",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-33287"
},
{
"cve": "CVE-2021-33289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33289"
}
],
"notes": [
{
"category": "general",
"text": "In NTFS-3G versions \u003c 2021.8.22, when a specially crafted MFT section is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33289",
"url": "https://www.suse.com/security/cve/CVE-2021-33289"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-33289",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-33289"
},
{
"cve": "CVE-2021-35266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35266"
}
],
"notes": [
{
"category": "general",
"text": "In NTFS-3G versions \u003c 2021.8.22, when a specially crafted NTFS inode pathname is supplied in an NTFS image a heap buffer overflow can occur resulting in memory disclosure, denial of service and even code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35266",
"url": "https://www.suse.com/security/cve/CVE-2021-35266"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-35266",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-35266"
},
{
"cve": "CVE-2021-35267",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35267"
}
],
"notes": [
{
"category": "general",
"text": "NTFS-3G versions \u003c 2021.8.22, a stack buffer overflow can occur when correcting differences in the MFT and MFTMirror allowing for code execution or escalation of privileges when setuid-root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35267",
"url": "https://www.suse.com/security/cve/CVE-2021-35267"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-35267",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-35267"
},
{
"cve": "CVE-2021-35268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35268"
}
],
"notes": [
{
"category": "general",
"text": "In NTFS-3G versions \u003c 2021.8.22, when a specially crafted NTFS inode is loaded in the function ntfs_inode_real_open, a heap buffer overflow can occur allowing for code execution and escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35268",
"url": "https://www.suse.com/security/cve/CVE-2021-35268"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-35268",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-35268"
},
{
"cve": "CVE-2021-35269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35269"
}
],
"notes": [
{
"category": "general",
"text": "NTFS-3G versions \u003c 2021.8.22, when a specially crafted NTFS attribute from the MFT is setup in the function ntfs_attr_setup_flag, a heap buffer overflow can occur allowing for code execution and escalation of privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35269",
"url": "https://www.suse.com/security/cve/CVE-2021-35269"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-35269",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-35269"
},
{
"cve": "CVE-2021-39251",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39251"
}
],
"notes": [
{
"category": "general",
"text": "A crafted NTFS image can cause a NULL pointer dereference in ntfs_extent_inode_open in NTFS-3G \u003c 2021.8.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39251",
"url": "https://www.suse.com/security/cve/CVE-2021-39251"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-39251",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-39251"
},
{
"cve": "CVE-2021-39252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39252"
}
],
"notes": [
{
"category": "general",
"text": "A crafted NTFS image can cause an out-of-bounds read in ntfs_ie_lookup in NTFS-3G \u003c 2021.8.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39252",
"url": "https://www.suse.com/security/cve/CVE-2021-39252"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-39252",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-39252"
},
{
"cve": "CVE-2021-39253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39253"
}
],
"notes": [
{
"category": "general",
"text": "A crafted NTFS image can cause an out-of-bounds read in ntfs_runlists_merge_i in NTFS-3G \u003c 2021.8.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39253",
"url": "https://www.suse.com/security/cve/CVE-2021-39253"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-39253",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-39253"
},
{
"cve": "CVE-2021-39255",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39255"
}
],
"notes": [
{
"category": "general",
"text": "A crafted NTFS image can trigger an out-of-bounds read, caused by an invalid attribute in ntfs_attr_find_in_attrdef, in NTFS-3G \u003c 2021.8.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39255",
"url": "https://www.suse.com/security/cve/CVE-2021-39255"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-39255",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-39255"
},
{
"cve": "CVE-2021-39256",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39256"
}
],
"notes": [
{
"category": "general",
"text": "A crafted NTFS image can cause a heap-based buffer overflow in ntfs_inode_lookup_by_name in NTFS-3G \u003c 2021.8.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39256",
"url": "https://www.suse.com/security/cve/CVE-2021-39256"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-39256",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-39256"
},
{
"cve": "CVE-2021-39257",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39257"
}
],
"notes": [
{
"category": "general",
"text": "A crafted NTFS image with an unallocated bitmap can lead to a endless recursive function call chain (starting from ntfs_attr_pwrite), causing stack consumption in NTFS-3G \u003c 2021.8.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39257",
"url": "https://www.suse.com/security/cve/CVE-2021-39257"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-39257",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-39257"
},
{
"cve": "CVE-2021-39258",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39258"
}
],
"notes": [
{
"category": "general",
"text": "A crafted NTFS image can cause out-of-bounds reads in ntfs_attr_find and ntfs_external_attr_find in NTFS-3G \u003c 2021.8.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39258",
"url": "https://www.suse.com/security/cve/CVE-2021-39258"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-39258",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-39258"
},
{
"cve": "CVE-2021-39259",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39259"
}
],
"notes": [
{
"category": "general",
"text": "A crafted NTFS image can trigger an out-of-bounds access, caused by an unsanitized attribute length in ntfs_inode_lookup_by_name, in NTFS-3G \u003c 2021.8.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39259",
"url": "https://www.suse.com/security/cve/CVE-2021-39259"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-39259",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-39259"
},
{
"cve": "CVE-2021-39260",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39260"
}
],
"notes": [
{
"category": "general",
"text": "A crafted NTFS image can cause an out-of-bounds access in ntfs_inode_sync_standard_information in NTFS-3G \u003c 2021.8.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39260",
"url": "https://www.suse.com/security/cve/CVE-2021-39260"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-39260",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-39260"
},
{
"cve": "CVE-2021-39261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39261"
}
],
"notes": [
{
"category": "general",
"text": "A crafted NTFS image can cause a heap-based buffer overflow in ntfs_compressed_pwrite in NTFS-3G \u003c 2021.8.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39261",
"url": "https://www.suse.com/security/cve/CVE-2021-39261"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-39261",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-39261"
},
{
"cve": "CVE-2021-39262",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39262"
}
],
"notes": [
{
"category": "general",
"text": "A crafted NTFS image can cause an out-of-bounds access in ntfs_decompress in NTFS-3G \u003c 2021.8.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39262",
"url": "https://www.suse.com/security/cve/CVE-2021-39262"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-39262",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-39262"
},
{
"cve": "CVE-2021-39263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39263"
}
],
"notes": [
{
"category": "general",
"text": "A crafted NTFS image can trigger a heap-based buffer overflow, caused by an unsanitized attribute in ntfs_get_attribute_value, in NTFS-3G \u003c 2021.8.22.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39263",
"url": "https://www.suse.com/security/cve/CVE-2021-39263"
},
{
"category": "external",
"summary": "SUSE Bug 1189720 for CVE-2021-39263",
"url": "https://bugzilla.suse.com/1189720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g-devel-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:libntfs-3g84-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfs-3g-2021.8.22-5.9.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:ntfsprogs-2021.8.22-5.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-09-07T07:48:15Z",
"details": "important"
}
],
"title": "CVE-2021-39263"
}
]
}
SUSE-SU-2018:2070-1
Vulnerability from csaf_suse - Published: 2018-07-26 14:37 - Updated: 2018-07-26 14:37Summary
Security update for ntfs-3g
Notes
Title of the patch
Security update for ntfs-3g
Description of the patch
This update for ntfs-3g fixes the following issues:
- CVE-2017-0358: Missing sanitization of the environment during a call to
modprobe allowed local users to escalate fo root privilege (bsc#1022500)
Patchnames
sdksp4-ntfs-3g-13703
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ntfs-3g",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ntfs-3g fixes the following issues:\n\n- CVE-2017-0358: Missing sanitization of the environment during a call to\n modprobe allowed local users to escalate fo root privilege (bsc#1022500)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-ntfs-3g-13703",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_2070-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:2070-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182070-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:2070-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-July/004316.html"
},
{
"category": "self",
"summary": "SUSE Bug 1022500",
"url": "https://bugzilla.suse.com/1022500"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-0358 page",
"url": "https://www.suse.com/security/cve/CVE-2017-0358/"
}
],
"title": "Security update for ntfs-3g",
"tracking": {
"current_release_date": "2018-07-26T14:37:15Z",
"generator": {
"date": "2018-07-26T14:37:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:2070-1",
"initial_release_date": "2018-07-26T14:37:15Z",
"revision_history": [
{
"date": "2018-07-26T14:37:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ntfs-3g-2011.4.12-0.9.3.1.i586",
"product": {
"name": "ntfs-3g-2011.4.12-0.9.3.1.i586",
"product_id": "ntfs-3g-2011.4.12-0.9.3.1.i586"
}
},
{
"category": "product_version",
"name": "ntfs-3g-devel-2011.4.12-0.9.3.1.i586",
"product": {
"name": "ntfs-3g-devel-2011.4.12-0.9.3.1.i586",
"product_id": "ntfs-3g-devel-2011.4.12-0.9.3.1.i586"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2011.4.12-0.9.3.1.i586",
"product": {
"name": "ntfsprogs-2011.4.12-0.9.3.1.i586",
"product_id": "ntfsprogs-2011.4.12-0.9.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ntfs-3g-2011.4.12-0.9.3.1.ia64",
"product": {
"name": "ntfs-3g-2011.4.12-0.9.3.1.ia64",
"product_id": "ntfs-3g-2011.4.12-0.9.3.1.ia64"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2011.4.12-0.9.3.1.ia64",
"product": {
"name": "ntfsprogs-2011.4.12-0.9.3.1.ia64",
"product_id": "ntfsprogs-2011.4.12-0.9.3.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ntfs-3g-2011.4.12-0.9.3.1.ppc64",
"product": {
"name": "ntfs-3g-2011.4.12-0.9.3.1.ppc64",
"product_id": "ntfs-3g-2011.4.12-0.9.3.1.ppc64"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2011.4.12-0.9.3.1.ppc64",
"product": {
"name": "ntfsprogs-2011.4.12-0.9.3.1.ppc64",
"product_id": "ntfsprogs-2011.4.12-0.9.3.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ntfs-3g-2011.4.12-0.9.3.1.s390x",
"product": {
"name": "ntfs-3g-2011.4.12-0.9.3.1.s390x",
"product_id": "ntfs-3g-2011.4.12-0.9.3.1.s390x"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2011.4.12-0.9.3.1.s390x",
"product": {
"name": "ntfsprogs-2011.4.12-0.9.3.1.s390x",
"product_id": "ntfsprogs-2011.4.12-0.9.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ntfs-3g-2011.4.12-0.9.3.1.x86_64",
"product": {
"name": "ntfs-3g-2011.4.12-0.9.3.1.x86_64",
"product_id": "ntfs-3g-2011.4.12-0.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64",
"product": {
"name": "ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64",
"product_id": "ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2011.4.12-0.9.3.1.x86_64",
"product": {
"name": "ntfsprogs-2011.4.12-0.9.3.1.x86_64",
"product_id": "ntfsprogs-2011.4.12-0.9.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfs-3g-2011.4.12-0.9.3.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.i586"
},
"product_reference": "ntfs-3g-2011.4.12-0.9.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfs-3g-2011.4.12-0.9.3.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ia64"
},
"product_reference": "ntfs-3g-2011.4.12-0.9.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfs-3g-2011.4.12-0.9.3.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ppc64"
},
"product_reference": "ntfs-3g-2011.4.12-0.9.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfs-3g-2011.4.12-0.9.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.s390x"
},
"product_reference": "ntfs-3g-2011.4.12-0.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfs-3g-2011.4.12-0.9.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.x86_64"
},
"product_reference": "ntfs-3g-2011.4.12-0.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfs-3g-devel-2011.4.12-0.9.3.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.i586"
},
"product_reference": "ntfs-3g-devel-2011.4.12-0.9.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64"
},
"product_reference": "ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfsprogs-2011.4.12-0.9.3.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.i586"
},
"product_reference": "ntfsprogs-2011.4.12-0.9.3.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfsprogs-2011.4.12-0.9.3.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ia64"
},
"product_reference": "ntfsprogs-2011.4.12-0.9.3.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfsprogs-2011.4.12-0.9.3.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ppc64"
},
"product_reference": "ntfsprogs-2011.4.12-0.9.3.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfsprogs-2011.4.12-0.9.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.s390x"
},
"product_reference": "ntfsprogs-2011.4.12-0.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfsprogs-2011.4.12-0.9.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.x86_64"
},
"product_reference": "ntfsprogs-2011.4.12-0.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-0358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-0358"
}
],
"notes": [
{
"category": "general",
"text": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-0358",
"url": "https://www.suse.com/security/cve/CVE-2017-0358"
},
{
"category": "external",
"summary": "SUSE Bug 1022500 for CVE-2017-0358",
"url": "https://bugzilla.suse.com/1022500"
},
{
"category": "external",
"summary": "SUSE Bug 1022999 for CVE-2017-0358",
"url": "https://bugzilla.suse.com/1022999"
},
{
"category": "external",
"summary": "SUSE Bug 1086936 for CVE-2017-0358",
"url": "https://bugzilla.suse.com/1086936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-2011.4.12-0.9.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfs-3g-devel-2011.4.12-0.9.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ia64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.ppc64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 11 SP4:ntfsprogs-2011.4.12-0.9.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-07-26T14:37:15Z",
"details": "moderate"
}
],
"title": "CVE-2017-0358"
}
]
}
SUSE-SU-2018:3587-1
Vulnerability from csaf_suse - Published: 2018-10-31 09:49 - Updated: 2018-10-31 09:49Summary
Security update for ntfs-3g_ntfsprogs
Notes
Title of the patch
Security update for ntfs-3g_ntfsprogs
Description of the patch
This update for ntfs-3g_ntfsprogs fixes the following issues:
- CVE-2017-0358: Missing sanitization of the environment during a call to
modprobe allowed local users to escalate fo root privilege (bsc#1022500)
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2018-2543,SUSE-SLE-SDK-12-SP3-2018-2543,SUSE-SLE-WE-12-SP3-2018-2543
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ntfs-3g_ntfsprogs",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ntfs-3g_ntfsprogs fixes the following issues:\n\n- CVE-2017-0358: Missing sanitization of the environment during a call to\n modprobe allowed local users to escalate fo root privilege (bsc#1022500)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP3-2018-2543,SUSE-SLE-SDK-12-SP3-2018-2543,SUSE-SLE-WE-12-SP3-2018-2543",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3587-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:3587-1",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183587-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:3587-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004816.html"
},
{
"category": "self",
"summary": "SUSE Bug 1022500",
"url": "https://bugzilla.suse.com/1022500"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-0358 page",
"url": "https://www.suse.com/security/cve/CVE-2017-0358/"
}
],
"title": "Security update for ntfs-3g_ntfsprogs",
"tracking": {
"current_release_date": "2018-10-31T09:49:46Z",
"generator": {
"date": "2018-10-31T09:49:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:3587-1",
"initial_release_date": "2018-10-31T09:49:46Z",
"revision_history": [
{
"date": "2018-10-31T09:49:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64",
"product": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64",
"product_id": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libntfs-3g84-2013.1.13-5.3.1.aarch64",
"product": {
"name": "libntfs-3g84-2013.1.13-5.3.1.aarch64",
"product_id": "libntfs-3g84-2013.1.13-5.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le",
"product": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le",
"product_id": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libntfs-3g84-2013.1.13-5.3.1.ppc64le",
"product": {
"name": "libntfs-3g84-2013.1.13-5.3.1.ppc64le",
"product_id": "libntfs-3g84-2013.1.13-5.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g-devel-2013.1.13-5.3.1.s390x",
"product": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.s390x",
"product_id": "libntfs-3g-devel-2013.1.13-5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libntfs-3g84-2013.1.13-5.3.1.s390x",
"product": {
"name": "libntfs-3g84-2013.1.13-5.3.1.s390x",
"product_id": "libntfs-3g84-2013.1.13-5.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g84-2013.1.13-5.3.1.x86_64",
"product": {
"name": "libntfs-3g84-2013.1.13-5.3.1.x86_64",
"product_id": "libntfs-3g84-2013.1.13-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ntfs-3g-2013.1.13-5.3.1.x86_64",
"product": {
"name": "ntfs-3g-2013.1.13-5.3.1.x86_64",
"product_id": "ntfs-3g-2013.1.13-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2013.1.13-5.3.1.x86_64",
"product": {
"name": "ntfsprogs-2013.1.13-5.3.1.x86_64",
"product_id": "ntfsprogs-2013.1.13-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64",
"product": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64",
"product_id": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64"
},
"product_reference": "libntfs-3g84-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfs-3g-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64"
},
"product_reference": "ntfs-3g-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfsprogs-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64"
},
"product_reference": "ntfsprogs-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.aarch64"
},
"product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le"
},
"product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.s390x"
},
"product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.x86_64"
},
"product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2013.1.13-5.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.aarch64"
},
"product_reference": "libntfs-3g84-2013.1.13-5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2013.1.13-5.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.ppc64le"
},
"product_reference": "libntfs-3g84-2013.1.13-5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2013.1.13-5.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.s390x"
},
"product_reference": "libntfs-3g84-2013.1.13-5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64"
},
"product_reference": "libntfs-3g84-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64"
},
"product_reference": "libntfs-3g84-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfs-3g-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64"
},
"product_reference": "ntfs-3g-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfsprogs-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64"
},
"product_reference": "ntfsprogs-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-0358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-0358"
}
],
"notes": [
{
"category": "general",
"text": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-0358",
"url": "https://www.suse.com/security/cve/CVE-2017-0358"
},
{
"category": "external",
"summary": "SUSE Bug 1022500 for CVE-2017-0358",
"url": "https://bugzilla.suse.com/1022500"
},
{
"category": "external",
"summary": "SUSE Bug 1022999 for CVE-2017-0358",
"url": "https://bugzilla.suse.com/1022999"
},
{
"category": "external",
"summary": "SUSE Bug 1086936 for CVE-2017-0358",
"url": "https://bugzilla.suse.com/1086936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g-devel-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:ntfs-3g-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP3:ntfsprogs-2013.1.13-5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-10-31T09:49:46Z",
"details": "moderate"
}
],
"title": "CVE-2017-0358"
}
]
}
SUSE-SU-2018:3587-2
Vulnerability from csaf_suse - Published: 2018-12-13 13:38 - Updated: 2018-12-13 13:38Summary
Security update for ntfs-3g_ntfsprogs
Notes
Title of the patch
Security update for ntfs-3g_ntfsprogs
Description of the patch
This update for ntfs-3g_ntfsprogs fixes the following issues:
- CVE-2017-0358: Missing sanitization of the environment during a call to
modprobe allowed local users to escalate fo root privilege (bsc#1022500)
Patchnames
SUSE-SLE-DESKTOP-12-SP4-2018-2543,SUSE-SLE-SDK-12-SP4-2018-2543,SUSE-SLE-WE-12-SP4-2018-2543
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for ntfs-3g_ntfsprogs",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for ntfs-3g_ntfsprogs fixes the following issues:\n\n- CVE-2017-0358: Missing sanitization of the environment during a call to\n modprobe allowed local users to escalate fo root privilege (bsc#1022500)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP4-2018-2543,SUSE-SLE-SDK-12-SP4-2018-2543,SUSE-SLE-WE-12-SP4-2018-2543",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3587-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2018:3587-2",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183587-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2018:3587-2",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2018-December/004961.html"
},
{
"category": "self",
"summary": "SUSE Bug 1022500",
"url": "https://bugzilla.suse.com/1022500"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-0358 page",
"url": "https://www.suse.com/security/cve/CVE-2017-0358/"
}
],
"title": "Security update for ntfs-3g_ntfsprogs",
"tracking": {
"current_release_date": "2018-12-13T13:38:21Z",
"generator": {
"date": "2018-12-13T13:38:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2018:3587-2",
"initial_release_date": "2018-12-13T13:38:21Z",
"revision_history": [
{
"date": "2018-12-13T13:38:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64",
"product": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64",
"product_id": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libntfs-3g84-2013.1.13-5.3.1.aarch64",
"product": {
"name": "libntfs-3g84-2013.1.13-5.3.1.aarch64",
"product_id": "libntfs-3g84-2013.1.13-5.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le",
"product": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le",
"product_id": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libntfs-3g84-2013.1.13-5.3.1.ppc64le",
"product": {
"name": "libntfs-3g84-2013.1.13-5.3.1.ppc64le",
"product_id": "libntfs-3g84-2013.1.13-5.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g-devel-2013.1.13-5.3.1.s390x",
"product": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.s390x",
"product_id": "libntfs-3g-devel-2013.1.13-5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libntfs-3g84-2013.1.13-5.3.1.s390x",
"product": {
"name": "libntfs-3g84-2013.1.13-5.3.1.s390x",
"product_id": "libntfs-3g84-2013.1.13-5.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libntfs-3g84-2013.1.13-5.3.1.x86_64",
"product": {
"name": "libntfs-3g84-2013.1.13-5.3.1.x86_64",
"product_id": "libntfs-3g84-2013.1.13-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ntfs-3g-2013.1.13-5.3.1.x86_64",
"product": {
"name": "ntfs-3g-2013.1.13-5.3.1.x86_64",
"product_id": "ntfs-3g-2013.1.13-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "ntfsprogs-2013.1.13-5.3.1.x86_64",
"product": {
"name": "ntfsprogs-2013.1.13-5.3.1.x86_64",
"product_id": "ntfsprogs-2013.1.13-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64",
"product": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64",
"product_id": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64"
},
"product_reference": "libntfs-3g84-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfs-3g-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64"
},
"product_reference": "ntfs-3g-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfsprogs-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64"
},
"product_reference": "ntfsprogs-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.aarch64"
},
"product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le"
},
"product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.s390x"
},
"product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.x86_64"
},
"product_reference": "libntfs-3g-devel-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2013.1.13-5.3.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.aarch64"
},
"product_reference": "libntfs-3g84-2013.1.13-5.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2013.1.13-5.3.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.ppc64le"
},
"product_reference": "libntfs-3g84-2013.1.13-5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2013.1.13-5.3.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.s390x"
},
"product_reference": "libntfs-3g84-2013.1.13-5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64"
},
"product_reference": "libntfs-3g84-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libntfs-3g84-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64"
},
"product_reference": "libntfs-3g84-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfs-3g-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64"
},
"product_reference": "ntfs-3g-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ntfsprogs-2013.1.13-5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64"
},
"product_reference": "ntfsprogs-2013.1.13-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-0358",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-0358"
}
],
"notes": [
{
"category": "general",
"text": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-0358",
"url": "https://www.suse.com/security/cve/CVE-2017-0358"
},
{
"category": "external",
"summary": "SUSE Bug 1022500 for CVE-2017-0358",
"url": "https://bugzilla.suse.com/1022500"
},
{
"category": "external",
"summary": "SUSE Bug 1022999 for CVE-2017-0358",
"url": "https://bugzilla.suse.com/1022999"
},
{
"category": "external",
"summary": "SUSE Bug 1086936 for CVE-2017-0358",
"url": "https://bugzilla.suse.com/1086936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g-devel-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:libntfs-3g84-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:ntfs-3g-2013.1.13-5.3.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:ntfsprogs-2013.1.13-5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2018-12-13T13:38:21Z",
"details": "moderate"
}
],
"title": "CVE-2017-0358"
}
]
}
GSD-2017-0358
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-0358",
"description": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.",
"id": "GSD-2017-0358",
"references": [
"https://www.suse.com/security/cve/CVE-2017-0358.html",
"https://www.debian.org/security/2017/dsa-3780",
"https://ubuntu.com/security/CVE-2017-0358",
"https://packetstormsecurity.com/files/cve/CVE-2017-0358"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-0358"
],
"details": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation.",
"id": "GSD-2017-0358",
"modified": "2023-12-13T01:20:59.522104Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"DATE_PUBLIC": "2017-02-01T05:44:00.000Z",
"ID": "CVE-2017-0358",
"STATE": "PUBLIC",
"TITLE": "ntfs-3g: Modprobe influence vulnerability via environment variables"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ntfs-3g",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "ntfs-3g"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Jann Horn of Google Project Zero"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "privilege escalation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "GLSA-201702-10",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201702-10"
},
{
"name": "DSA-3780",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2017/dsa-3780"
},
{
"name": "41240",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41240/"
},
{
"name": "41356",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41356/"
},
{
"name": "95987",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/95987"
},
{
"name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
"refsource": "MLIST",
"url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2"
},
{
"name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2017/02/04/1"
}
]
},
"source": {
"advisory": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2016.2.22",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2017-0358"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Jann Horn of Google Project Zero discovered that NTFS-3G, a read-write NTFS driver for FUSE, does not scrub the environment before executing modprobe with elevated privileges. A local user can take advantage of this flaw for local root privilege escalation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20170203 Re: CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2017/02/04/1"
},
{
"name": "41356",
"refsource": "EXPLOIT-DB",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/41356/"
},
{
"name": "41240",
"refsource": "EXPLOIT-DB",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/41240/"
},
{
"name": "GLSA-201702-10",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201702-10"
},
{
"name": "[oss-security] 20170201 CVE-2017-0358 ntfs-3g: modprobe influence vulnerability via environment variables",
"refsource": "MLIST",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://marc.info/?l=oss-security\u0026m=148594671929354\u0026w=2"
},
{
"name": "95987",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/95987"
},
{
"name": "DSA-3780",
"refsource": "DEBIAN",
"tags": [],
"url": "https://www.debian.org/security/2017/dsa-3780"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-10-03T00:03Z",
"publishedDate": "2018-04-13T15:29Z"
}
}
}
CNVD-2017-01533
Vulnerability from cnvd - Published: 2017-03-20
VLAI Severity ?
Title
NTFS-3G本地提权漏洞
Description
NTFS-3G是一个开源的软件,可以实现Linux、Free BSD、Mac OSX、NetBSD和Haiku等操作系统中的NTFS读写支持。
NTFS-3G存在本地提权漏洞。本地攻击者利用该漏洞获取root权限。
Severity
中
Patch Name
NTFS-3G本地提权漏洞的补丁
Patch Description
NTFS-3G是一个开源的软件,可以实现Linux、Free BSD、Mac OSX、NetBSD和Haiku等操作系统中的NTFS读写支持。
NTFS-3G存在本地提权漏洞。本地攻击者利用该漏洞获取root权限。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: http://seclists.org/oss-sec/2017/q1/259
Reference
http://www.securityfocus.com/bid/95987
Impacted products
| Name | Ntfs-3g Ntfs-3g 0 |
|---|
{
"bids": {
"bid": {
"bidNumber": "95987"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-0358",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0358"
}
},
"description": "NTFS-3G\u662f\u4e00\u4e2a\u5f00\u6e90\u7684\u8f6f\u4ef6\uff0c\u53ef\u4ee5\u5b9e\u73b0Linux\u3001Free BSD\u3001Mac OSX\u3001NetBSD\u548cHaiku\u7b49\u64cd\u4f5c\u7cfb\u7edf\u4e2d\u7684NTFS\u8bfb\u5199\u652f\u6301\u3002\r\n\r\nNTFS-3G\u5b58\u5728\u672c\u5730\u63d0\u6743\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6root\u6743\u9650\u3002",
"discovererName": "Jann Horn, Project Zero (Google)",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0:\r\nhttp://seclists.org/oss-sec/2017/q1/259",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-01533",
"openTime": "2017-03-20",
"patchDescription": "NTFS-3G\u662f\u4e00\u4e2a\u5f00\u6e90\u7684\u8f6f\u4ef6\uff0c\u53ef\u4ee5\u5b9e\u73b0Linux\u3001Free BSD\u3001Mac OSX\u3001NetBSD\u548cHaiku\u7b49\u64cd\u4f5c\u7cfb\u7edf\u4e2d\u7684NTFS\u8bfb\u5199\u652f\u6301\u3002\r\n\r\nNTFS-3G\u5b58\u5728\u672c\u5730\u63d0\u6743\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6root\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "NTFS-3G\u672c\u5730\u63d0\u6743\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Ntfs-3g Ntfs-3g 0"
},
"referenceLink": "http://www.securityfocus.com/bid/95987",
"serverity": "\u4e2d",
"submitTime": "2017-02-10",
"title": "NTFS-3G\u672c\u5730\u63d0\u6743\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…