Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-3689 (GCVE-0-2019-3689)
Vulnerability from cvelistv5 – Published: 2019-09-19 13:27 – Updated: 2024-09-17 04:14
VLAI?
EPSS
Title
nfs-utils: root-owned files stored in insecure /var/lib/nfs directory
Summary
The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.
Severity ?
5.1 (Medium)
CWE
- CWE-276 - Incorrect Default Permissions
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server 12 |
Affected:
before and including version 1.3.0-34.18.1
|
|||||||
|
|||||||||
Date Public ?
2019-09-17 00:00
Credits
Malte Kraus of SUSE
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:19:17.496Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1150733"
},
{
"name": "[debian-lts-announce] 20191019 [SECURITY] [DLA 1965-1] nfs-utils security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html"
},
{
"name": "openSUSE-SU-2019:2408",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html"
},
{
"name": "openSUSE-SU-2019:2435",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://git.linux-nfs.org/?p=steved/nfs-utils.git%3Ba=commitdiff%3Bh=fee2cc29e888f2ced6a76990923aef19d326dc0e"
},
{
"name": "USN-4400-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4400-1/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SUSE Linux Enterprise Server 12",
"vendor": "SUSE",
"versions": [
{
"status": "affected",
"version": "before and including version 1.3.0-34.18.1"
}
]
},
{
"product": "SUSE Linux Enterprise Server 15",
"vendor": "SUSE",
"versions": [
{
"status": "affected",
"version": "before and including version 2.1.1-6.10.2"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Malte Kraus of SUSE"
}
],
"datePublic": "2019-09-17T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-276",
"description": "CWE-276 Incorrect Default Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-07-02T16:06:23.000Z",
"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb",
"shortName": "suse"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1150733"
},
{
"name": "[debian-lts-announce] 20191019 [SECURITY] [DLA 1965-1] nfs-utils security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html"
},
{
"name": "openSUSE-SU-2019:2408",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html"
},
{
"name": "openSUSE-SU-2019:2435",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://git.linux-nfs.org/?p=steved/nfs-utils.git%3Ba=commitdiff%3Bh=fee2cc29e888f2ced6a76990923aef19d326dc0e"
},
{
"name": "USN-4400-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4400-1/"
}
],
"source": {
"advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1150733",
"defect": [
"1150733"
],
"discovery": "INTERNAL"
},
"title": "nfs-utils: root-owned files stored in insecure /var/lib/nfs directory",
"x_generator": {
"engine": "Vulnogram 0.0.8"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2019-09-17T00:00:00.000Z",
"ID": "CVE-2019-3689",
"STATE": "PUBLIC",
"TITLE": "nfs-utils: root-owned files stored in insecure /var/lib/nfs directory"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SUSE Linux Enterprise Server 12",
"version": {
"version_data": [
{
"version_value": "before and including version 1.3.0-34.18.1"
}
]
}
},
{
"product_name": "SUSE Linux Enterprise Server 15",
"version": {
"version_data": [
{
"version_value": "before and including version 2.1.1-6.10.2"
}
]
}
}
]
},
"vendor_name": "SUSE"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Malte Kraus of SUSE"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.8"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-276 Incorrect Default Permissions"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1150733",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1150733"
},
{
"name": "[debian-lts-announce] 20191019 [SECURITY] [DLA 1965-1] nfs-utils security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html"
},
{
"name": "openSUSE-SU-2019:2408",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html"
},
{
"name": "openSUSE-SU-2019:2435",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html"
},
{
"name": "https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=fee2cc29e888f2ced6a76990923aef19d326dc0e",
"refsource": "MISC",
"url": "https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=fee2cc29e888f2ced6a76990923aef19d326dc0e"
},
{
"name": "USN-4400-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4400-1/"
}
]
},
"source": {
"advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1150733",
"defect": [
"1150733"
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb",
"assignerShortName": "suse",
"cveId": "CVE-2019-3689",
"datePublished": "2019-09-19T13:27:58.449Z",
"dateReserved": "2019-01-03T00:00:00.000Z",
"dateUpdated": "2024-09-17T04:14:20.947Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linux-nfs:nfs-utils:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.3.0-34.18.1\", \"matchCriteriaId\": \"6F22C7A7-70F3-4ADB-BCD4-4D5AA2D4C45B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F922115C-1907-4F65-9F23-3E63A8BCD4A7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:linux-nfs:nfs-utils:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.1.1-6.10.2\", \"matchCriteriaId\": \"D21280A6-C5AD-4214-B4A2-70AC712345D9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"70A029CD-2AC4-4877-B1A4-5C72B351BA27\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.\"}, {\"lang\": \"es\", \"value\": \"El paquete nfs-utils en SUSE Linux Enterprise Server 12 en versiones anteriores e incluyendo la versi\\u00f3n 1.3.0-34.18.1 y en SUSE Linux Enterprise Server 15 en versiones anteriores e incluyendo la versi\\u00f3n 2.1.1-6.10.2, el directorio /var/lib/nfs es propiedad de statd:nogroup. Este directorio contiene archivos de propiedad y administrados por root. Si statd esta comprometido, puede enga\\u00f1ar a los procesos que se ejecutan con privilegios de root para crear/sobrescribir archivos en cualquier parte del sistema si fs.protected_symlinks no est\\u00e1 configurado.\"}]",
"id": "CVE-2019-3689",
"lastModified": "2024-11-21T04:42:20.263",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"meissner@suse.de\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\", \"baseScore\": 5.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.5, \"impactScore\": 2.5}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-09-19T14:15:10.650",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html\", \"source\": \"meissner@suse.de\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html\", \"source\": \"meissner@suse.de\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1150733\", \"source\": \"meissner@suse.de\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://git.linux-nfs.org/?p=steved/nfs-utils.git%3Ba=commitdiff%3Bh=fee2cc29e888f2ced6a76990923aef19d326dc0e\", \"source\": \"meissner@suse.de\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html\", \"source\": \"meissner@suse.de\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4400-1/\", \"source\": \"meissner@suse.de\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1150733\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://git.linux-nfs.org/?p=steved/nfs-utils.git%3Ba=commitdiff%3Bh=fee2cc29e888f2ced6a76990923aef19d326dc0e\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/4400-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "meissner@suse.de",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"meissner@suse.de\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-276\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-276\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-3689\",\"sourceIdentifier\":\"meissner@suse.de\",\"published\":\"2019-09-19T14:15:10.650\",\"lastModified\":\"2024-11-21T04:42:20.263\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.\"},{\"lang\":\"es\",\"value\":\"El paquete nfs-utils en SUSE Linux Enterprise Server 12 en versiones anteriores e incluyendo la versi\u00f3n 1.3.0-34.18.1 y en SUSE Linux Enterprise Server 15 en versiones anteriores e incluyendo la versi\u00f3n 2.1.1-6.10.2, el directorio /var/lib/nfs es propiedad de statd:nogroup. Este directorio contiene archivos de propiedad y administrados por root. Si statd esta comprometido, puede enga\u00f1ar a los procesos que se ejecutan con privilegios de root para crear/sobrescribir archivos en cualquier parte del sistema si fs.protected_symlinks no est\u00e1 configurado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"meissner@suse.de\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\",\"baseScore\":5.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.5,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"meissner@suse.de\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-276\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-276\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linux-nfs:nfs-utils:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.3.0-34.18.1\",\"matchCriteriaId\":\"6F22C7A7-70F3-4ADB-BCD4-4D5AA2D4C45B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F922115C-1907-4F65-9F23-3E63A8BCD4A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linux-nfs:nfs-utils:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.1.1-6.10.2\",\"matchCriteriaId\":\"D21280A6-C5AD-4214-B4A2-70AC712345D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70A029CD-2AC4-4877-B1A4-5C72B351BA27\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html\",\"source\":\"meissner@suse.de\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html\",\"source\":\"meissner@suse.de\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1150733\",\"source\":\"meissner@suse.de\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.linux-nfs.org/?p=steved/nfs-utils.git%3Ba=commitdiff%3Bh=fee2cc29e888f2ced6a76990923aef19d326dc0e\",\"source\":\"meissner@suse.de\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html\",\"source\":\"meissner@suse.de\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4400-1/\",\"source\":\"meissner@suse.de\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1150733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://git.linux-nfs.org/?p=steved/nfs-utils.git%3Ba=commitdiff%3Bh=fee2cc29e888f2ced6a76990923aef19d326dc0e\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4400-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
OPENSUSE-SU-2024:11090-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
libnfsidmap1-1.0-26.2 on GA media
Severity
Moderate
Notes
Title of the patch: libnfsidmap1-1.0-26.2 on GA media
Description of the patch: These are all security issues fixed in the libnfsidmap1-1.0-26.2 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11090
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libnfsidmap1-1.0-26.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libnfsidmap1-1.0-26.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11090",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11090-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3689 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3689/"
}
],
"title": "libnfsidmap1-1.0-26.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11090-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libnfsidmap1-1.0-26.2.aarch64",
"product": {
"name": "libnfsidmap1-1.0-26.2.aarch64",
"product_id": "libnfsidmap1-1.0-26.2.aarch64"
}
},
{
"category": "product_version",
"name": "nfs-client-2.5.4-26.2.aarch64",
"product": {
"name": "nfs-client-2.5.4-26.2.aarch64",
"product_id": "nfs-client-2.5.4-26.2.aarch64"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.5.4-26.2.aarch64",
"product": {
"name": "nfs-kernel-server-2.5.4-26.2.aarch64",
"product_id": "nfs-kernel-server-2.5.4-26.2.aarch64"
}
},
{
"category": "product_version",
"name": "nfsidmap-devel-1.0-26.2.aarch64",
"product": {
"name": "nfsidmap-devel-1.0-26.2.aarch64",
"product_id": "nfsidmap-devel-1.0-26.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libnfsidmap1-1.0-26.2.ppc64le",
"product": {
"name": "libnfsidmap1-1.0-26.2.ppc64le",
"product_id": "libnfsidmap1-1.0-26.2.ppc64le"
}
},
{
"category": "product_version",
"name": "nfs-client-2.5.4-26.2.ppc64le",
"product": {
"name": "nfs-client-2.5.4-26.2.ppc64le",
"product_id": "nfs-client-2.5.4-26.2.ppc64le"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.5.4-26.2.ppc64le",
"product": {
"name": "nfs-kernel-server-2.5.4-26.2.ppc64le",
"product_id": "nfs-kernel-server-2.5.4-26.2.ppc64le"
}
},
{
"category": "product_version",
"name": "nfsidmap-devel-1.0-26.2.ppc64le",
"product": {
"name": "nfsidmap-devel-1.0-26.2.ppc64le",
"product_id": "nfsidmap-devel-1.0-26.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libnfsidmap1-1.0-26.2.s390x",
"product": {
"name": "libnfsidmap1-1.0-26.2.s390x",
"product_id": "libnfsidmap1-1.0-26.2.s390x"
}
},
{
"category": "product_version",
"name": "nfs-client-2.5.4-26.2.s390x",
"product": {
"name": "nfs-client-2.5.4-26.2.s390x",
"product_id": "nfs-client-2.5.4-26.2.s390x"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.5.4-26.2.s390x",
"product": {
"name": "nfs-kernel-server-2.5.4-26.2.s390x",
"product_id": "nfs-kernel-server-2.5.4-26.2.s390x"
}
},
{
"category": "product_version",
"name": "nfsidmap-devel-1.0-26.2.s390x",
"product": {
"name": "nfsidmap-devel-1.0-26.2.s390x",
"product_id": "nfsidmap-devel-1.0-26.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libnfsidmap1-1.0-26.2.x86_64",
"product": {
"name": "libnfsidmap1-1.0-26.2.x86_64",
"product_id": "libnfsidmap1-1.0-26.2.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-client-2.5.4-26.2.x86_64",
"product": {
"name": "nfs-client-2.5.4-26.2.x86_64",
"product_id": "nfs-client-2.5.4-26.2.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.5.4-26.2.x86_64",
"product": {
"name": "nfs-kernel-server-2.5.4-26.2.x86_64",
"product_id": "nfs-kernel-server-2.5.4-26.2.x86_64"
}
},
{
"category": "product_version",
"name": "nfsidmap-devel-1.0-26.2.x86_64",
"product": {
"name": "nfsidmap-devel-1.0-26.2.x86_64",
"product_id": "nfsidmap-devel-1.0-26.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap1-1.0-26.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.aarch64"
},
"product_reference": "libnfsidmap1-1.0-26.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap1-1.0-26.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.ppc64le"
},
"product_reference": "libnfsidmap1-1.0-26.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap1-1.0-26.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.s390x"
},
"product_reference": "libnfsidmap1-1.0-26.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libnfsidmap1-1.0-26.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.x86_64"
},
"product_reference": "libnfsidmap1-1.0-26.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.5.4-26.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nfs-client-2.5.4-26.2.aarch64"
},
"product_reference": "nfs-client-2.5.4-26.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.5.4-26.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nfs-client-2.5.4-26.2.ppc64le"
},
"product_reference": "nfs-client-2.5.4-26.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.5.4-26.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nfs-client-2.5.4-26.2.s390x"
},
"product_reference": "nfs-client-2.5.4-26.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.5.4-26.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nfs-client-2.5.4-26.2.x86_64"
},
"product_reference": "nfs-client-2.5.4-26.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.5.4-26.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.aarch64"
},
"product_reference": "nfs-kernel-server-2.5.4-26.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.5.4-26.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.ppc64le"
},
"product_reference": "nfs-kernel-server-2.5.4-26.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.5.4-26.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.s390x"
},
"product_reference": "nfs-kernel-server-2.5.4-26.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.5.4-26.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.x86_64"
},
"product_reference": "nfs-kernel-server-2.5.4-26.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsidmap-devel-1.0-26.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.aarch64"
},
"product_reference": "nfsidmap-devel-1.0-26.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsidmap-devel-1.0-26.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.ppc64le"
},
"product_reference": "nfsidmap-devel-1.0-26.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsidmap-devel-1.0-26.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.s390x"
},
"product_reference": "nfsidmap-devel-1.0-26.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfsidmap-devel-1.0-26.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.x86_64"
},
"product_reference": "nfsidmap-devel-1.0-26.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3689",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3689"
}
],
"notes": [
{
"category": "general",
"text": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.aarch64",
"openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.ppc64le",
"openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.s390x",
"openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.x86_64",
"openSUSE Tumbleweed:nfs-client-2.5.4-26.2.aarch64",
"openSUSE Tumbleweed:nfs-client-2.5.4-26.2.ppc64le",
"openSUSE Tumbleweed:nfs-client-2.5.4-26.2.s390x",
"openSUSE Tumbleweed:nfs-client-2.5.4-26.2.x86_64",
"openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.aarch64",
"openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.ppc64le",
"openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.s390x",
"openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.x86_64",
"openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.aarch64",
"openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.ppc64le",
"openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.s390x",
"openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3689",
"url": "https://www.suse.com/security/cve/CVE-2019-3689"
},
{
"category": "external",
"summary": "SUSE Bug 1150733 for CVE-2019-3689",
"url": "https://bugzilla.suse.com/1150733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.aarch64",
"openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.ppc64le",
"openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.s390x",
"openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.x86_64",
"openSUSE Tumbleweed:nfs-client-2.5.4-26.2.aarch64",
"openSUSE Tumbleweed:nfs-client-2.5.4-26.2.ppc64le",
"openSUSE Tumbleweed:nfs-client-2.5.4-26.2.s390x",
"openSUSE Tumbleweed:nfs-client-2.5.4-26.2.x86_64",
"openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.aarch64",
"openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.ppc64le",
"openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.s390x",
"openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.x86_64",
"openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.aarch64",
"openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.ppc64le",
"openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.s390x",
"openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.aarch64",
"openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.ppc64le",
"openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.s390x",
"openSUSE Tumbleweed:libnfsidmap1-1.0-26.2.x86_64",
"openSUSE Tumbleweed:nfs-client-2.5.4-26.2.aarch64",
"openSUSE Tumbleweed:nfs-client-2.5.4-26.2.ppc64le",
"openSUSE Tumbleweed:nfs-client-2.5.4-26.2.s390x",
"openSUSE Tumbleweed:nfs-client-2.5.4-26.2.x86_64",
"openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.aarch64",
"openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.ppc64le",
"openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.s390x",
"openSUSE Tumbleweed:nfs-kernel-server-2.5.4-26.2.x86_64",
"openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.aarch64",
"openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.ppc64le",
"openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.s390x",
"openSUSE Tumbleweed:nfsidmap-devel-1.0-26.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-3689"
}
]
}
OPENSUSE-SU-2024:11307-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
rpmlint-2.1+git20210924.ad0cf53-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: rpmlint-2.1+git20210924.ad0cf53-1.1 on GA media
Description of the patch: These are all security issues fixed in the rpmlint-2.1+git20210924.ad0cf53-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11307
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "rpmlint-2.1+git20210924.ad0cf53-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the rpmlint-2.1+git20210924.ad0cf53-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11307",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11307-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3689 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3689/"
}
],
"title": "rpmlint-2.1+git20210924.ad0cf53-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11307-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rpmlint-2.1+git20210924.ad0cf53-1.1.aarch64",
"product": {
"name": "rpmlint-2.1+git20210924.ad0cf53-1.1.aarch64",
"product_id": "rpmlint-2.1+git20210924.ad0cf53-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rpmlint-2.1+git20210924.ad0cf53-1.1.ppc64le",
"product": {
"name": "rpmlint-2.1+git20210924.ad0cf53-1.1.ppc64le",
"product_id": "rpmlint-2.1+git20210924.ad0cf53-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rpmlint-2.1+git20210924.ad0cf53-1.1.s390x",
"product": {
"name": "rpmlint-2.1+git20210924.ad0cf53-1.1.s390x",
"product_id": "rpmlint-2.1+git20210924.ad0cf53-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rpmlint-2.1+git20210924.ad0cf53-1.1.x86_64",
"product": {
"name": "rpmlint-2.1+git20210924.ad0cf53-1.1.x86_64",
"product_id": "rpmlint-2.1+git20210924.ad0cf53-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rpmlint-2.1+git20210924.ad0cf53-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.aarch64"
},
"product_reference": "rpmlint-2.1+git20210924.ad0cf53-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpmlint-2.1+git20210924.ad0cf53-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.ppc64le"
},
"product_reference": "rpmlint-2.1+git20210924.ad0cf53-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpmlint-2.1+git20210924.ad0cf53-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.s390x"
},
"product_reference": "rpmlint-2.1+git20210924.ad0cf53-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpmlint-2.1+git20210924.ad0cf53-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.x86_64"
},
"product_reference": "rpmlint-2.1+git20210924.ad0cf53-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3689",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3689"
}
],
"notes": [
{
"category": "general",
"text": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.aarch64",
"openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.ppc64le",
"openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.s390x",
"openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3689",
"url": "https://www.suse.com/security/cve/CVE-2019-3689"
},
{
"category": "external",
"summary": "SUSE Bug 1150733 for CVE-2019-3689",
"url": "https://bugzilla.suse.com/1150733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.aarch64",
"openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.ppc64le",
"openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.s390x",
"openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.aarch64",
"openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.ppc64le",
"openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.s390x",
"openSUSE Tumbleweed:rpmlint-2.1+git20210924.ad0cf53-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-3689"
}
]
}
OPENSUSE-SU-2019:2408-1
Vulnerability from csaf_opensuse - Published: 2019-10-29 15:27 - Updated: 2019-10-29 15:27Summary
Security update for nfs-utils
Severity
Moderate
Notes
Title of the patch: Security update for nfs-utils
Description of the patch: This update for nfs-utils fixes the following issues:
- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames: openSUSE-2019-2408
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nfs-utils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nfs-utils fixes the following issues:\n\n- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2408",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2408-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2408-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DANISIKC2QA3XUD5Y4QUCFZE65LVNFWA/#DANISIKC2QA3XUD5Y4QUCFZE65LVNFWA"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2408-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DANISIKC2QA3XUD5Y4QUCFZE65LVNFWA/#DANISIKC2QA3XUD5Y4QUCFZE65LVNFWA"
},
{
"category": "self",
"summary": "SUSE Bug 1150733",
"url": "https://bugzilla.suse.com/1150733"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3689 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3689/"
}
],
"title": "Security update for nfs-utils",
"tracking": {
"current_release_date": "2019-10-29T15:27:20Z",
"generator": {
"date": "2019-10-29T15:27:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2408-1",
"initial_release_date": "2019-10-29T15:27:20Z",
"revision_history": [
{
"date": "2019-10-29T15:27:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-lp150.4.10.1.i586",
"product": {
"name": "nfs-client-2.1.1-lp150.4.10.1.i586",
"product_id": "nfs-client-2.1.1-lp150.4.10.1.i586"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-lp150.4.10.1.i586",
"product": {
"name": "nfs-doc-2.1.1-lp150.4.10.1.i586",
"product_id": "nfs-doc-2.1.1-lp150.4.10.1.i586"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-lp150.4.10.1.i586",
"product": {
"name": "nfs-kernel-server-2.1.1-lp150.4.10.1.i586",
"product_id": "nfs-kernel-server-2.1.1-lp150.4.10.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-lp150.4.10.1.x86_64",
"product": {
"name": "nfs-client-2.1.1-lp150.4.10.1.x86_64",
"product_id": "nfs-client-2.1.1-lp150.4.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-lp150.4.10.1.x86_64",
"product": {
"name": "nfs-doc-2.1.1-lp150.4.10.1.x86_64",
"product_id": "nfs-doc-2.1.1-lp150.4.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-lp150.4.10.1.x86_64",
"product": {
"name": "nfs-kernel-server-2.1.1-lp150.4.10.1.x86_64",
"product_id": "nfs-kernel-server-2.1.1-lp150.4.10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.1.1-lp150.4.10.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:nfs-client-2.1.1-lp150.4.10.1.i586"
},
"product_reference": "nfs-client-2.1.1-lp150.4.10.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.1.1-lp150.4.10.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:nfs-client-2.1.1-lp150.4.10.1.x86_64"
},
"product_reference": "nfs-client-2.1.1-lp150.4.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-2.1.1-lp150.4.10.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:nfs-doc-2.1.1-lp150.4.10.1.i586"
},
"product_reference": "nfs-doc-2.1.1-lp150.4.10.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-2.1.1-lp150.4.10.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:nfs-doc-2.1.1-lp150.4.10.1.x86_64"
},
"product_reference": "nfs-doc-2.1.1-lp150.4.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.1.1-lp150.4.10.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:nfs-kernel-server-2.1.1-lp150.4.10.1.i586"
},
"product_reference": "nfs-kernel-server-2.1.1-lp150.4.10.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.1.1-lp150.4.10.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:nfs-kernel-server-2.1.1-lp150.4.10.1.x86_64"
},
"product_reference": "nfs-kernel-server-2.1.1-lp150.4.10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3689",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3689"
}
],
"notes": [
{
"category": "general",
"text": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:nfs-client-2.1.1-lp150.4.10.1.i586",
"openSUSE Leap 15.0:nfs-client-2.1.1-lp150.4.10.1.x86_64",
"openSUSE Leap 15.0:nfs-doc-2.1.1-lp150.4.10.1.i586",
"openSUSE Leap 15.0:nfs-doc-2.1.1-lp150.4.10.1.x86_64",
"openSUSE Leap 15.0:nfs-kernel-server-2.1.1-lp150.4.10.1.i586",
"openSUSE Leap 15.0:nfs-kernel-server-2.1.1-lp150.4.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3689",
"url": "https://www.suse.com/security/cve/CVE-2019-3689"
},
{
"category": "external",
"summary": "SUSE Bug 1150733 for CVE-2019-3689",
"url": "https://bugzilla.suse.com/1150733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:nfs-client-2.1.1-lp150.4.10.1.i586",
"openSUSE Leap 15.0:nfs-client-2.1.1-lp150.4.10.1.x86_64",
"openSUSE Leap 15.0:nfs-doc-2.1.1-lp150.4.10.1.i586",
"openSUSE Leap 15.0:nfs-doc-2.1.1-lp150.4.10.1.x86_64",
"openSUSE Leap 15.0:nfs-kernel-server-2.1.1-lp150.4.10.1.i586",
"openSUSE Leap 15.0:nfs-kernel-server-2.1.1-lp150.4.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:nfs-client-2.1.1-lp150.4.10.1.i586",
"openSUSE Leap 15.0:nfs-client-2.1.1-lp150.4.10.1.x86_64",
"openSUSE Leap 15.0:nfs-doc-2.1.1-lp150.4.10.1.i586",
"openSUSE Leap 15.0:nfs-doc-2.1.1-lp150.4.10.1.x86_64",
"openSUSE Leap 15.0:nfs-kernel-server-2.1.1-lp150.4.10.1.i586",
"openSUSE Leap 15.0:nfs-kernel-server-2.1.1-lp150.4.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-29T15:27:20Z",
"details": "important"
}
],
"title": "CVE-2019-3689"
}
]
}
OPENSUSE-SU-2019:2435-1
Vulnerability from csaf_opensuse - Published: 2019-11-05 15:30 - Updated: 2019-11-05 15:30Summary
Security update for nfs-utils
Severity
Moderate
Notes
Title of the patch: Security update for nfs-utils
Description of the patch: This update for nfs-utils fixes the following issues:
- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
This update was imported from the SUSE:SLE-15-SP1:Update update project.
Patchnames: openSUSE-2019-2435
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nfs-utils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nfs-utils fixes the following issues:\n\n- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2435",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2435-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2435-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VRJ4FZYKCXQJYYW2SHUMRX7O3BYNNLH2/#VRJ4FZYKCXQJYYW2SHUMRX7O3BYNNLH2"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2435-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VRJ4FZYKCXQJYYW2SHUMRX7O3BYNNLH2/#VRJ4FZYKCXQJYYW2SHUMRX7O3BYNNLH2"
},
{
"category": "self",
"summary": "SUSE Bug 1150733",
"url": "https://bugzilla.suse.com/1150733"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3689 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3689/"
}
],
"title": "Security update for nfs-utils",
"tracking": {
"current_release_date": "2019-11-05T15:30:45Z",
"generator": {
"date": "2019-11-05T15:30:45Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2435-1",
"initial_release_date": "2019-11-05T15:30:45Z",
"revision_history": [
{
"date": "2019-11-05T15:30:45Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-lp151.7.3.1.i586",
"product": {
"name": "nfs-client-2.1.1-lp151.7.3.1.i586",
"product_id": "nfs-client-2.1.1-lp151.7.3.1.i586"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-lp151.7.3.1.i586",
"product": {
"name": "nfs-doc-2.1.1-lp151.7.3.1.i586",
"product_id": "nfs-doc-2.1.1-lp151.7.3.1.i586"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-lp151.7.3.1.i586",
"product": {
"name": "nfs-kernel-server-2.1.1-lp151.7.3.1.i586",
"product_id": "nfs-kernel-server-2.1.1-lp151.7.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-lp151.7.3.1.x86_64",
"product": {
"name": "nfs-client-2.1.1-lp151.7.3.1.x86_64",
"product_id": "nfs-client-2.1.1-lp151.7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-lp151.7.3.1.x86_64",
"product": {
"name": "nfs-doc-2.1.1-lp151.7.3.1.x86_64",
"product_id": "nfs-doc-2.1.1-lp151.7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-lp151.7.3.1.x86_64",
"product": {
"name": "nfs-kernel-server-2.1.1-lp151.7.3.1.x86_64",
"product_id": "nfs-kernel-server-2.1.1-lp151.7.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.1.1-lp151.7.3.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:nfs-client-2.1.1-lp151.7.3.1.i586"
},
"product_reference": "nfs-client-2.1.1-lp151.7.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.1.1-lp151.7.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:nfs-client-2.1.1-lp151.7.3.1.x86_64"
},
"product_reference": "nfs-client-2.1.1-lp151.7.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-2.1.1-lp151.7.3.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:nfs-doc-2.1.1-lp151.7.3.1.i586"
},
"product_reference": "nfs-doc-2.1.1-lp151.7.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-2.1.1-lp151.7.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:nfs-doc-2.1.1-lp151.7.3.1.x86_64"
},
"product_reference": "nfs-doc-2.1.1-lp151.7.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.1.1-lp151.7.3.1.i586 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:nfs-kernel-server-2.1.1-lp151.7.3.1.i586"
},
"product_reference": "nfs-kernel-server-2.1.1-lp151.7.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.1.1-lp151.7.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:nfs-kernel-server-2.1.1-lp151.7.3.1.x86_64"
},
"product_reference": "nfs-kernel-server-2.1.1-lp151.7.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3689",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3689"
}
],
"notes": [
{
"category": "general",
"text": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:nfs-client-2.1.1-lp151.7.3.1.i586",
"openSUSE Leap 15.1:nfs-client-2.1.1-lp151.7.3.1.x86_64",
"openSUSE Leap 15.1:nfs-doc-2.1.1-lp151.7.3.1.i586",
"openSUSE Leap 15.1:nfs-doc-2.1.1-lp151.7.3.1.x86_64",
"openSUSE Leap 15.1:nfs-kernel-server-2.1.1-lp151.7.3.1.i586",
"openSUSE Leap 15.1:nfs-kernel-server-2.1.1-lp151.7.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3689",
"url": "https://www.suse.com/security/cve/CVE-2019-3689"
},
{
"category": "external",
"summary": "SUSE Bug 1150733 for CVE-2019-3689",
"url": "https://bugzilla.suse.com/1150733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:nfs-client-2.1.1-lp151.7.3.1.i586",
"openSUSE Leap 15.1:nfs-client-2.1.1-lp151.7.3.1.x86_64",
"openSUSE Leap 15.1:nfs-doc-2.1.1-lp151.7.3.1.i586",
"openSUSE Leap 15.1:nfs-doc-2.1.1-lp151.7.3.1.x86_64",
"openSUSE Leap 15.1:nfs-kernel-server-2.1.1-lp151.7.3.1.i586",
"openSUSE Leap 15.1:nfs-kernel-server-2.1.1-lp151.7.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:nfs-client-2.1.1-lp151.7.3.1.i586",
"openSUSE Leap 15.1:nfs-client-2.1.1-lp151.7.3.1.x86_64",
"openSUSE Leap 15.1:nfs-doc-2.1.1-lp151.7.3.1.i586",
"openSUSE Leap 15.1:nfs-doc-2.1.1-lp151.7.3.1.x86_64",
"openSUSE Leap 15.1:nfs-kernel-server-2.1.1-lp151.7.3.1.i586",
"openSUSE Leap 15.1:nfs-kernel-server-2.1.1-lp151.7.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-05T15:30:45Z",
"details": "important"
}
],
"title": "CVE-2019-3689"
}
]
}
SUSE-SU-2019:2776-1
Vulnerability from csaf_suse - Published: 2019-10-24 13:55 - Updated: 2019-10-24 13:55Summary
Security update for nfs-utils
Severity
Moderate
Notes
Title of the patch: Security update for nfs-utils
Description of the patch: This update for nfs-utils fixes the following issues:
- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
Patchnames: SUSE-2019-2776,SUSE-SLE-Module-Basesystem-15-2019-2776
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nfs-utils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nfs-utils fixes the following issues:\n\n- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2776,SUSE-SLE-Module-Basesystem-15-2019-2776",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2776-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2776-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192776-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2776-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192776-1.html"
},
{
"category": "self",
"summary": "SUSE Bug 1150733",
"url": "https://bugzilla.suse.com/1150733"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3689 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3689/"
}
],
"title": "Security update for nfs-utils",
"tracking": {
"current_release_date": "2019-10-24T13:55:22Z",
"generator": {
"date": "2019-10-24T13:55:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2776-1",
"initial_release_date": "2019-10-24T13:55:22Z",
"revision_history": [
{
"date": "2019-10-24T13:55:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-6.14.1.aarch64",
"product": {
"name": "nfs-client-2.1.1-6.14.1.aarch64",
"product_id": "nfs-client-2.1.1-6.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-6.14.1.aarch64",
"product": {
"name": "nfs-doc-2.1.1-6.14.1.aarch64",
"product_id": "nfs-doc-2.1.1-6.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-6.14.1.aarch64",
"product": {
"name": "nfs-kernel-server-2.1.1-6.14.1.aarch64",
"product_id": "nfs-kernel-server-2.1.1-6.14.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-6.14.1.i586",
"product": {
"name": "nfs-client-2.1.1-6.14.1.i586",
"product_id": "nfs-client-2.1.1-6.14.1.i586"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-6.14.1.i586",
"product": {
"name": "nfs-doc-2.1.1-6.14.1.i586",
"product_id": "nfs-doc-2.1.1-6.14.1.i586"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-6.14.1.i586",
"product": {
"name": "nfs-kernel-server-2.1.1-6.14.1.i586",
"product_id": "nfs-kernel-server-2.1.1-6.14.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-6.14.1.ppc64le",
"product": {
"name": "nfs-client-2.1.1-6.14.1.ppc64le",
"product_id": "nfs-client-2.1.1-6.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-6.14.1.ppc64le",
"product": {
"name": "nfs-doc-2.1.1-6.14.1.ppc64le",
"product_id": "nfs-doc-2.1.1-6.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-6.14.1.ppc64le",
"product": {
"name": "nfs-kernel-server-2.1.1-6.14.1.ppc64le",
"product_id": "nfs-kernel-server-2.1.1-6.14.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-6.14.1.s390x",
"product": {
"name": "nfs-client-2.1.1-6.14.1.s390x",
"product_id": "nfs-client-2.1.1-6.14.1.s390x"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-6.14.1.s390x",
"product": {
"name": "nfs-doc-2.1.1-6.14.1.s390x",
"product_id": "nfs-doc-2.1.1-6.14.1.s390x"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-6.14.1.s390x",
"product": {
"name": "nfs-kernel-server-2.1.1-6.14.1.s390x",
"product_id": "nfs-kernel-server-2.1.1-6.14.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-6.14.1.x86_64",
"product": {
"name": "nfs-client-2.1.1-6.14.1.x86_64",
"product_id": "nfs-client-2.1.1-6.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-6.14.1.x86_64",
"product": {
"name": "nfs-doc-2.1.1-6.14.1.x86_64",
"product_id": "nfs-doc-2.1.1-6.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-6.14.1.x86_64",
"product": {
"name": "nfs-kernel-server-2.1.1-6.14.1.x86_64",
"product_id": "nfs-kernel-server-2.1.1-6.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.1.1-6.14.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.aarch64"
},
"product_reference": "nfs-client-2.1.1-6.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.1.1-6.14.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.ppc64le"
},
"product_reference": "nfs-client-2.1.1-6.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.1.1-6.14.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.s390x"
},
"product_reference": "nfs-client-2.1.1-6.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.1.1-6.14.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.x86_64"
},
"product_reference": "nfs-client-2.1.1-6.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-2.1.1-6.14.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.aarch64"
},
"product_reference": "nfs-doc-2.1.1-6.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-2.1.1-6.14.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.ppc64le"
},
"product_reference": "nfs-doc-2.1.1-6.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-2.1.1-6.14.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.s390x"
},
"product_reference": "nfs-doc-2.1.1-6.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-2.1.1-6.14.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.x86_64"
},
"product_reference": "nfs-doc-2.1.1-6.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.1.1-6.14.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.aarch64"
},
"product_reference": "nfs-kernel-server-2.1.1-6.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.1.1-6.14.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.ppc64le"
},
"product_reference": "nfs-kernel-server-2.1.1-6.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.1.1-6.14.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.s390x"
},
"product_reference": "nfs-kernel-server-2.1.1-6.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.1.1-6.14.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.x86_64"
},
"product_reference": "nfs-kernel-server-2.1.1-6.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3689",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3689"
}
],
"notes": [
{
"category": "general",
"text": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3689",
"url": "https://www.suse.com/security/cve/CVE-2019-3689"
},
{
"category": "external",
"summary": "SUSE Bug 1150733 for CVE-2019-3689",
"url": "https://bugzilla.suse.com/1150733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-client-2.1.1-6.14.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-doc-2.1.1-6.14.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:nfs-kernel-server-2.1.1-6.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T13:55:22Z",
"details": "important"
}
],
"title": "CVE-2019-3689"
}
]
}
SUSE-SU-2019:2782-1
Vulnerability from csaf_suse - Published: 2019-10-25 12:27 - Updated: 2019-10-25 12:27Summary
Security update for nfs-utils
Severity
Moderate
Notes
Title of the patch: Security update for nfs-utils
Description of the patch: This update for nfs-utils fixes the following issues:
- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
Patchnames: SUSE-2019-2782,SUSE-SLE-Module-Basesystem-15-SP1-2019-2782
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nfs-utils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nfs-utils fixes the following issues:\n\n- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2782,SUSE-SLE-Module-Basesystem-15-SP1-2019-2782",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2782-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2782-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192782-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2782-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-October/006056.html"
},
{
"category": "self",
"summary": "SUSE Bug 1150733",
"url": "https://bugzilla.suse.com/1150733"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3689 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3689/"
}
],
"title": "Security update for nfs-utils",
"tracking": {
"current_release_date": "2019-10-25T12:27:54Z",
"generator": {
"date": "2019-10-25T12:27:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2782-1",
"initial_release_date": "2019-10-25T12:27:54Z",
"revision_history": [
{
"date": "2019-10-25T12:27:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-10.4.1.aarch64",
"product": {
"name": "nfs-client-2.1.1-10.4.1.aarch64",
"product_id": "nfs-client-2.1.1-10.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-10.4.1.aarch64",
"product": {
"name": "nfs-doc-2.1.1-10.4.1.aarch64",
"product_id": "nfs-doc-2.1.1-10.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-10.4.1.aarch64",
"product": {
"name": "nfs-kernel-server-2.1.1-10.4.1.aarch64",
"product_id": "nfs-kernel-server-2.1.1-10.4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-10.4.1.i586",
"product": {
"name": "nfs-client-2.1.1-10.4.1.i586",
"product_id": "nfs-client-2.1.1-10.4.1.i586"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-10.4.1.i586",
"product": {
"name": "nfs-doc-2.1.1-10.4.1.i586",
"product_id": "nfs-doc-2.1.1-10.4.1.i586"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-10.4.1.i586",
"product": {
"name": "nfs-kernel-server-2.1.1-10.4.1.i586",
"product_id": "nfs-kernel-server-2.1.1-10.4.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-10.4.1.ppc64le",
"product": {
"name": "nfs-client-2.1.1-10.4.1.ppc64le",
"product_id": "nfs-client-2.1.1-10.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-10.4.1.ppc64le",
"product": {
"name": "nfs-doc-2.1.1-10.4.1.ppc64le",
"product_id": "nfs-doc-2.1.1-10.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-10.4.1.ppc64le",
"product": {
"name": "nfs-kernel-server-2.1.1-10.4.1.ppc64le",
"product_id": "nfs-kernel-server-2.1.1-10.4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-10.4.1.s390x",
"product": {
"name": "nfs-client-2.1.1-10.4.1.s390x",
"product_id": "nfs-client-2.1.1-10.4.1.s390x"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-10.4.1.s390x",
"product": {
"name": "nfs-doc-2.1.1-10.4.1.s390x",
"product_id": "nfs-doc-2.1.1-10.4.1.s390x"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-10.4.1.s390x",
"product": {
"name": "nfs-kernel-server-2.1.1-10.4.1.s390x",
"product_id": "nfs-kernel-server-2.1.1-10.4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-2.1.1-10.4.1.x86_64",
"product": {
"name": "nfs-client-2.1.1-10.4.1.x86_64",
"product_id": "nfs-client-2.1.1-10.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-doc-2.1.1-10.4.1.x86_64",
"product": {
"name": "nfs-doc-2.1.1-10.4.1.x86_64",
"product_id": "nfs-doc-2.1.1-10.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-2.1.1-10.4.1.x86_64",
"product": {
"name": "nfs-kernel-server-2.1.1-10.4.1.x86_64",
"product_id": "nfs-kernel-server-2.1.1-10.4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.1.1-10.4.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.aarch64"
},
"product_reference": "nfs-client-2.1.1-10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.1.1-10.4.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.ppc64le"
},
"product_reference": "nfs-client-2.1.1-10.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.1.1-10.4.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.s390x"
},
"product_reference": "nfs-client-2.1.1-10.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-2.1.1-10.4.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.x86_64"
},
"product_reference": "nfs-client-2.1.1-10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-2.1.1-10.4.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.aarch64"
},
"product_reference": "nfs-doc-2.1.1-10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-2.1.1-10.4.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.ppc64le"
},
"product_reference": "nfs-doc-2.1.1-10.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-2.1.1-10.4.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.s390x"
},
"product_reference": "nfs-doc-2.1.1-10.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-2.1.1-10.4.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.x86_64"
},
"product_reference": "nfs-doc-2.1.1-10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.1.1-10.4.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.aarch64"
},
"product_reference": "nfs-kernel-server-2.1.1-10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.1.1-10.4.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.ppc64le"
},
"product_reference": "nfs-kernel-server-2.1.1-10.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.1.1-10.4.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.s390x"
},
"product_reference": "nfs-kernel-server-2.1.1-10.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-2.1.1-10.4.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.x86_64"
},
"product_reference": "nfs-kernel-server-2.1.1-10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3689",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3689"
}
],
"notes": [
{
"category": "general",
"text": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3689",
"url": "https://www.suse.com/security/cve/CVE-2019-3689"
},
{
"category": "external",
"summary": "SUSE Bug 1150733 for CVE-2019-3689",
"url": "https://bugzilla.suse.com/1150733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-client-2.1.1-10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-doc-2.1.1-10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:nfs-kernel-server-2.1.1-10.4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:27:54Z",
"details": "important"
}
],
"title": "CVE-2019-3689"
}
]
}
SUSE-SU-2019:2771-1
Vulnerability from csaf_suse - Published: 2019-10-24 11:48 - Updated: 2019-10-24 11:48Summary
Security update for nfs-utils
Severity
Moderate
Notes
Title of the patch: Security update for nfs-utils
Description of the patch: This update for nfs-utils fixes the following issues:
- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
Patchnames: SUSE-2019-2771,SUSE-SLE-SAP-12-SP1-2019-2771,SUSE-SLE-SERVER-12-SP1-2019-2771
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nfs-utils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nfs-utils fixes the following issues:\n\n- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2771,SUSE-SLE-SAP-12-SP1-2019-2771,SUSE-SLE-SERVER-12-SP1-2019-2771",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2771-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2771-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192771-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2771-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-October/006051.html"
},
{
"category": "self",
"summary": "SUSE Bug 1150733",
"url": "https://bugzilla.suse.com/1150733"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3689 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3689/"
}
],
"title": "Security update for nfs-utils",
"tracking": {
"current_release_date": "2019-10-24T11:48:59Z",
"generator": {
"date": "2019-10-24T11:48:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2771-1",
"initial_release_date": "2019-10-24T11:48:59Z",
"revision_history": [
{
"date": "2019-10-24T11:48:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-1.3.0-41.3.1.aarch64",
"product": {
"name": "nfs-client-1.3.0-41.3.1.aarch64",
"product_id": "nfs-client-1.3.0-41.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "nfs-doc-1.3.0-41.3.1.aarch64",
"product": {
"name": "nfs-doc-1.3.0-41.3.1.aarch64",
"product_id": "nfs-doc-1.3.0-41.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-1.3.0-41.3.1.aarch64",
"product": {
"name": "nfs-kernel-server-1.3.0-41.3.1.aarch64",
"product_id": "nfs-kernel-server-1.3.0-41.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-1.3.0-41.3.1.i586",
"product": {
"name": "nfs-client-1.3.0-41.3.1.i586",
"product_id": "nfs-client-1.3.0-41.3.1.i586"
}
},
{
"category": "product_version",
"name": "nfs-doc-1.3.0-41.3.1.i586",
"product": {
"name": "nfs-doc-1.3.0-41.3.1.i586",
"product_id": "nfs-doc-1.3.0-41.3.1.i586"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-1.3.0-41.3.1.i586",
"product": {
"name": "nfs-kernel-server-1.3.0-41.3.1.i586",
"product_id": "nfs-kernel-server-1.3.0-41.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-1.3.0-41.3.1.ppc64le",
"product": {
"name": "nfs-client-1.3.0-41.3.1.ppc64le",
"product_id": "nfs-client-1.3.0-41.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nfs-doc-1.3.0-41.3.1.ppc64le",
"product": {
"name": "nfs-doc-1.3.0-41.3.1.ppc64le",
"product_id": "nfs-doc-1.3.0-41.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-1.3.0-41.3.1.ppc64le",
"product": {
"name": "nfs-kernel-server-1.3.0-41.3.1.ppc64le",
"product_id": "nfs-kernel-server-1.3.0-41.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-1.3.0-41.3.1.s390",
"product": {
"name": "nfs-client-1.3.0-41.3.1.s390",
"product_id": "nfs-client-1.3.0-41.3.1.s390"
}
},
{
"category": "product_version",
"name": "nfs-doc-1.3.0-41.3.1.s390",
"product": {
"name": "nfs-doc-1.3.0-41.3.1.s390",
"product_id": "nfs-doc-1.3.0-41.3.1.s390"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-1.3.0-41.3.1.s390",
"product": {
"name": "nfs-kernel-server-1.3.0-41.3.1.s390",
"product_id": "nfs-kernel-server-1.3.0-41.3.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-1.3.0-41.3.1.s390x",
"product": {
"name": "nfs-client-1.3.0-41.3.1.s390x",
"product_id": "nfs-client-1.3.0-41.3.1.s390x"
}
},
{
"category": "product_version",
"name": "nfs-doc-1.3.0-41.3.1.s390x",
"product": {
"name": "nfs-doc-1.3.0-41.3.1.s390x",
"product_id": "nfs-doc-1.3.0-41.3.1.s390x"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-1.3.0-41.3.1.s390x",
"product": {
"name": "nfs-kernel-server-1.3.0-41.3.1.s390x",
"product_id": "nfs-kernel-server-1.3.0-41.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-1.3.0-41.3.1.x86_64",
"product": {
"name": "nfs-client-1.3.0-41.3.1.x86_64",
"product_id": "nfs-client-1.3.0-41.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-doc-1.3.0-41.3.1.x86_64",
"product": {
"name": "nfs-doc-1.3.0-41.3.1.x86_64",
"product_id": "nfs-doc-1.3.0-41.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-1.3.0-41.3.1.x86_64",
"product": {
"name": "nfs-kernel-server-1.3.0-41.3.1.x86_64",
"product_id": "nfs-kernel-server-1.3.0-41.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-41.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:nfs-client-1.3.0-41.3.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-41.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-41.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:nfs-doc-1.3.0-41.3.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-41.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-41.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:nfs-kernel-server-1.3.0-41.3.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-41.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-41.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-client-1.3.0-41.3.1.ppc64le"
},
"product_reference": "nfs-client-1.3.0-41.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-41.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-client-1.3.0-41.3.1.s390x"
},
"product_reference": "nfs-client-1.3.0-41.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-41.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-client-1.3.0-41.3.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-41.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-41.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-doc-1.3.0-41.3.1.ppc64le"
},
"product_reference": "nfs-doc-1.3.0-41.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-41.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-doc-1.3.0-41.3.1.s390x"
},
"product_reference": "nfs-doc-1.3.0-41.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-41.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-doc-1.3.0-41.3.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-41.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-41.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-kernel-server-1.3.0-41.3.1.ppc64le"
},
"product_reference": "nfs-kernel-server-1.3.0-41.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-41.3.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-kernel-server-1.3.0-41.3.1.s390x"
},
"product_reference": "nfs-kernel-server-1.3.0-41.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-41.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-kernel-server-1.3.0-41.3.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-41.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3689",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3689"
}
],
"notes": [
{
"category": "general",
"text": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-client-1.3.0-41.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-client-1.3.0-41.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-client-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-doc-1.3.0-41.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-doc-1.3.0-41.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-doc-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-kernel-server-1.3.0-41.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-kernel-server-1.3.0-41.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-kernel-server-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nfs-client-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nfs-doc-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nfs-kernel-server-1.3.0-41.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3689",
"url": "https://www.suse.com/security/cve/CVE-2019-3689"
},
{
"category": "external",
"summary": "SUSE Bug 1150733 for CVE-2019-3689",
"url": "https://bugzilla.suse.com/1150733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-client-1.3.0-41.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-client-1.3.0-41.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-client-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-doc-1.3.0-41.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-doc-1.3.0-41.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-doc-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-kernel-server-1.3.0-41.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-kernel-server-1.3.0-41.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-kernel-server-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nfs-client-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nfs-doc-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nfs-kernel-server-1.3.0-41.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-client-1.3.0-41.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-client-1.3.0-41.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-client-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-doc-1.3.0-41.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-doc-1.3.0-41.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-doc-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-kernel-server-1.3.0-41.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-kernel-server-1.3.0-41.3.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nfs-kernel-server-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nfs-client-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nfs-doc-1.3.0-41.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nfs-kernel-server-1.3.0-41.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-24T11:48:59Z",
"details": "important"
}
],
"title": "CVE-2019-3689"
}
]
}
SUSE-SU-2019:2781-1
Vulnerability from csaf_suse - Published: 2019-10-25 12:27 - Updated: 2019-10-25 12:27Summary
Security update for nfs-utils
Severity
Moderate
Notes
Title of the patch: Security update for nfs-utils
Description of the patch: This update for nfs-utils fixes the following issues:
- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)
Patchnames: HPE-Helion-OpenStack-8-2019-2781,SUSE-2019-2781,SUSE-OpenStack-Cloud-7-2019-2781,SUSE-OpenStack-Cloud-8-2019-2781,SUSE-OpenStack-Cloud-Crowbar-8-2019-2781,SUSE-SLE-DESKTOP-12-SP4-2019-2781,SUSE-SLE-DESKTOP-12-SP5-2019-2781,SUSE-SLE-SAP-12-SP2-2019-2781,SUSE-SLE-SAP-12-SP3-2019-2781,SUSE-SLE-SERVER-12-SP2-2019-2781,SUSE-SLE-SERVER-12-SP2-BCL-2019-2781,SUSE-SLE-SERVER-12-SP3-2019-2781,SUSE-SLE-SERVER-12-SP3-BCL-2019-2781,SUSE-SLE-SERVER-12-SP4-2019-2781,SUSE-SLE-SERVER-12-SP5-2019-2781,SUSE-Storage-4-2019-2781,SUSE-Storage-5-2019-2781
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for nfs-utils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for nfs-utils fixes the following issues:\n\n- CVE-2019-3689: Fixed root-owned files stored in insecure /var/lib/nfs. (bsc#1150733)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2019-2781,SUSE-2019-2781,SUSE-OpenStack-Cloud-7-2019-2781,SUSE-OpenStack-Cloud-8-2019-2781,SUSE-OpenStack-Cloud-Crowbar-8-2019-2781,SUSE-SLE-DESKTOP-12-SP4-2019-2781,SUSE-SLE-DESKTOP-12-SP5-2019-2781,SUSE-SLE-SAP-12-SP2-2019-2781,SUSE-SLE-SAP-12-SP3-2019-2781,SUSE-SLE-SERVER-12-SP2-2019-2781,SUSE-SLE-SERVER-12-SP2-BCL-2019-2781,SUSE-SLE-SERVER-12-SP3-2019-2781,SUSE-SLE-SERVER-12-SP3-BCL-2019-2781,SUSE-SLE-SERVER-12-SP4-2019-2781,SUSE-SLE-SERVER-12-SP5-2019-2781,SUSE-Storage-4-2019-2781,SUSE-Storage-5-2019-2781",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2781-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2781-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2781-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192781-1.html"
},
{
"category": "self",
"summary": "SUSE Bug 1150733",
"url": "https://bugzilla.suse.com/1150733"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3689 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3689/"
}
],
"title": "Security update for nfs-utils",
"tracking": {
"current_release_date": "2019-10-25T12:27:43Z",
"generator": {
"date": "2019-10-25T12:27:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2781-1",
"initial_release_date": "2019-10-25T12:27:43Z",
"revision_history": [
{
"date": "2019-10-25T12:27:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-1.3.0-34.22.1.aarch64",
"product": {
"name": "nfs-client-1.3.0-34.22.1.aarch64",
"product_id": "nfs-client-1.3.0-34.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "nfs-doc-1.3.0-34.22.1.aarch64",
"product": {
"name": "nfs-doc-1.3.0-34.22.1.aarch64",
"product_id": "nfs-doc-1.3.0-34.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-1.3.0-34.22.1.aarch64",
"product": {
"name": "nfs-kernel-server-1.3.0-34.22.1.aarch64",
"product_id": "nfs-kernel-server-1.3.0-34.22.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-1.3.0-34.22.1.i586",
"product": {
"name": "nfs-client-1.3.0-34.22.1.i586",
"product_id": "nfs-client-1.3.0-34.22.1.i586"
}
},
{
"category": "product_version",
"name": "nfs-doc-1.3.0-34.22.1.i586",
"product": {
"name": "nfs-doc-1.3.0-34.22.1.i586",
"product_id": "nfs-doc-1.3.0-34.22.1.i586"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-1.3.0-34.22.1.i586",
"product": {
"name": "nfs-kernel-server-1.3.0-34.22.1.i586",
"product_id": "nfs-kernel-server-1.3.0-34.22.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-1.3.0-34.22.1.ppc64le",
"product": {
"name": "nfs-client-1.3.0-34.22.1.ppc64le",
"product_id": "nfs-client-1.3.0-34.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nfs-doc-1.3.0-34.22.1.ppc64le",
"product": {
"name": "nfs-doc-1.3.0-34.22.1.ppc64le",
"product_id": "nfs-doc-1.3.0-34.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"product": {
"name": "nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"product_id": "nfs-kernel-server-1.3.0-34.22.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-1.3.0-34.22.1.s390",
"product": {
"name": "nfs-client-1.3.0-34.22.1.s390",
"product_id": "nfs-client-1.3.0-34.22.1.s390"
}
},
{
"category": "product_version",
"name": "nfs-doc-1.3.0-34.22.1.s390",
"product": {
"name": "nfs-doc-1.3.0-34.22.1.s390",
"product_id": "nfs-doc-1.3.0-34.22.1.s390"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-1.3.0-34.22.1.s390",
"product": {
"name": "nfs-kernel-server-1.3.0-34.22.1.s390",
"product_id": "nfs-kernel-server-1.3.0-34.22.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-1.3.0-34.22.1.s390x",
"product": {
"name": "nfs-client-1.3.0-34.22.1.s390x",
"product_id": "nfs-client-1.3.0-34.22.1.s390x"
}
},
{
"category": "product_version",
"name": "nfs-doc-1.3.0-34.22.1.s390x",
"product": {
"name": "nfs-doc-1.3.0-34.22.1.s390x",
"product_id": "nfs-doc-1.3.0-34.22.1.s390x"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-1.3.0-34.22.1.s390x",
"product": {
"name": "nfs-kernel-server-1.3.0-34.22.1.s390x",
"product_id": "nfs-kernel-server-1.3.0-34.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "nfs-client-1.3.0-34.22.1.x86_64",
"product": {
"name": "nfs-client-1.3.0-34.22.1.x86_64",
"product_id": "nfs-client-1.3.0-34.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-doc-1.3.0-34.22.1.x86_64",
"product": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64",
"product_id": "nfs-doc-1.3.0-34.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"product": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"product_id": "nfs-kernel-server-1.3.0-34.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 5",
"product": {
"name": "SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:nfs-client-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-client-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:nfs-doc-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:nfs-kernel-server-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-client-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-client-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-doc-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-kernel-server-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-client-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-client-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-doc-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-kernel-server-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-client-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-client-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-client-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-client-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-doc-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-doc-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-kernel-server-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-kernel-server-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-client-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-client-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-client-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-client-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-client-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-client-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-client-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-client-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-client-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-client-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.ppc64le"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.s390x"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.aarch64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:nfs-client-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-client-1.3.0-34.22.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:nfs-client-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-client-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.aarch64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:nfs-doc-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-doc-1.3.0-34.22.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:nfs-doc-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-doc-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.aarch64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:nfs-kernel-server-1.3.0-34.22.1.aarch64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nfs-kernel-server-1.3.0-34.22.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:nfs-kernel-server-1.3.0-34.22.1.x86_64"
},
"product_reference": "nfs-kernel-server-1.3.0-34.22.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3689",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3689"
}
],
"notes": [
{
"category": "general",
"text": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:nfs-client-1.3.0-34.22.1.x86_64",
"HPE Helion OpenStack 8:nfs-doc-1.3.0-34.22.1.x86_64",
"HPE Helion OpenStack 8:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 4:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 4:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 4:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 5:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Enterprise Storage 5:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 5:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Enterprise Storage 5:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 5:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Enterprise Storage 5:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 7:nfs-client-1.3.0-34.22.1.s390x",
"SUSE OpenStack Cloud 7:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 7:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE OpenStack Cloud 7:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 7:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE OpenStack Cloud 7:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 8:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 8:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 8:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:nfs-kernel-server-1.3.0-34.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3689",
"url": "https://www.suse.com/security/cve/CVE-2019-3689"
},
{
"category": "external",
"summary": "SUSE Bug 1150733 for CVE-2019-3689",
"url": "https://bugzilla.suse.com/1150733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:nfs-client-1.3.0-34.22.1.x86_64",
"HPE Helion OpenStack 8:nfs-doc-1.3.0-34.22.1.x86_64",
"HPE Helion OpenStack 8:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 4:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 4:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 4:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 5:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Enterprise Storage 5:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 5:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Enterprise Storage 5:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 5:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Enterprise Storage 5:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 7:nfs-client-1.3.0-34.22.1.s390x",
"SUSE OpenStack Cloud 7:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 7:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE OpenStack Cloud 7:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 7:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE OpenStack Cloud 7:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 8:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 8:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 8:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:nfs-kernel-server-1.3.0-34.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:nfs-client-1.3.0-34.22.1.x86_64",
"HPE Helion OpenStack 8:nfs-doc-1.3.0-34.22.1.x86_64",
"HPE Helion OpenStack 8:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 4:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 4:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 4:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 5:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Enterprise Storage 5:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 5:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Enterprise Storage 5:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Enterprise Storage 5:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Enterprise Storage 5:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 7:nfs-client-1.3.0-34.22.1.s390x",
"SUSE OpenStack Cloud 7:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 7:nfs-doc-1.3.0-34.22.1.s390x",
"SUSE OpenStack Cloud 7:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 7:nfs-kernel-server-1.3.0-34.22.1.s390x",
"SUSE OpenStack Cloud 7:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 8:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 8:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud 8:nfs-kernel-server-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:nfs-client-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:nfs-doc-1.3.0-34.22.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:nfs-kernel-server-1.3.0-34.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-25T12:27:43Z",
"details": "important"
}
],
"title": "CVE-2019-3689"
}
]
}
FKIE_CVE-2019-3689
Vulnerability from fkie_nvd - Published: 2019-09-19 14:15 - Updated: 2024-11-21 04:42
Severity ?
5.1 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.
References
| URL | Tags | ||
|---|---|---|---|
| meissner@suse.de | http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html | Vendor Advisory | |
| meissner@suse.de | http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html | Vendor Advisory | |
| meissner@suse.de | https://bugzilla.suse.com/show_bug.cgi?id=1150733 | Issue Tracking, Patch, Vendor Advisory | |
| meissner@suse.de | https://git.linux-nfs.org/?p=steved/nfs-utils.git%3Ba=commitdiff%3Bh=fee2cc29e888f2ced6a76990923aef19d326dc0e | ||
| meissner@suse.de | https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html | Third Party Advisory | |
| meissner@suse.de | https://usn.ubuntu.com/4400-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.suse.com/show_bug.cgi?id=1150733 | Issue Tracking, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.linux-nfs.org/?p=steved/nfs-utils.git%3Ba=commitdiff%3Bh=fee2cc29e888f2ced6a76990923aef19d326dc0e | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4400-1/ | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| linux-nfs | nfs-utils | * | |
| suse | linux_enterprise_server | 12 | |
| linux-nfs | nfs-utils | * | |
| suse | linux_enterprise_server | 15 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linux-nfs:nfs-utils:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F22C7A7-70F3-4ADB-BCD4-4D5AA2D4C45B",
"versionEndIncluding": "1.3.0-34.18.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*",
"matchCriteriaId": "F922115C-1907-4F65-9F23-3E63A8BCD4A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linux-nfs:nfs-utils:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D21280A6-C5AD-4214-B4A2-70AC712345D9",
"versionEndIncluding": "2.1.1-6.10.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*",
"matchCriteriaId": "70A029CD-2AC4-4877-B1A4-5C72B351BA27",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system."
},
{
"lang": "es",
"value": "El paquete nfs-utils en SUSE Linux Enterprise Server 12 en versiones anteriores e incluyendo la versi\u00f3n 1.3.0-34.18.1 y en SUSE Linux Enterprise Server 15 en versiones anteriores e incluyendo la versi\u00f3n 2.1.1-6.10.2, el directorio /var/lib/nfs es propiedad de statd:nogroup. Este directorio contiene archivos de propiedad y administrados por root. Si statd esta comprometido, puede enga\u00f1ar a los procesos que se ejecutan con privilegios de root para crear/sobrescribir archivos en cualquier parte del sistema si fs.protected_symlinks no est\u00e1 configurado."
}
],
"id": "CVE-2019-3689",
"lastModified": "2024-11-21T04:42:20.263",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5,
"source": "meissner@suse.de",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-09-19T14:15:10.650",
"references": [
{
"source": "meissner@suse.de",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html"
},
{
"source": "meissner@suse.de",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html"
},
{
"source": "meissner@suse.de",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1150733"
},
{
"source": "meissner@suse.de",
"url": "https://git.linux-nfs.org/?p=steved/nfs-utils.git%3Ba=commitdiff%3Bh=fee2cc29e888f2ced6a76990923aef19d326dc0e"
},
{
"source": "meissner@suse.de",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html"
},
{
"source": "meissner@suse.de",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4400-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1150733"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://git.linux-nfs.org/?p=steved/nfs-utils.git%3Ba=commitdiff%3Bh=fee2cc29e888f2ced6a76990923aef19d326dc0e"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4400-1/"
}
],
"sourceIdentifier": "meissner@suse.de",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
],
"source": "meissner@suse.de",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2019-3689
Vulnerability from gsd - Updated: 2023-12-13 01:24Details
The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-3689",
"description": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.",
"id": "GSD-2019-3689",
"references": [
"https://www.suse.com/security/cve/CVE-2019-3689.html",
"https://ubuntu.com/security/CVE-2019-3689"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-3689"
],
"details": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.",
"id": "GSD-2019-3689",
"modified": "2023-12-13T01:24:04.201145Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"DATE_PUBLIC": "2019-09-17T00:00:00.000Z",
"ID": "CVE-2019-3689",
"STATE": "PUBLIC",
"TITLE": "nfs-utils: root-owned files stored in insecure /var/lib/nfs directory"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SUSE Linux Enterprise Server 12",
"version": {
"version_data": [
{
"version_value": "before and including version 1.3.0-34.18.1"
}
]
}
},
{
"product_name": "SUSE Linux Enterprise Server 15",
"version": {
"version_data": [
{
"version_value": "before and including version 2.1.1-6.10.2"
}
]
}
}
]
},
"vendor_name": "SUSE"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Malte Kraus of SUSE"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.8"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-276 Incorrect Default Permissions"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1150733",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1150733"
},
{
"name": "[debian-lts-announce] 20191019 [SECURITY] [DLA 1965-1] nfs-utils security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html"
},
{
"name": "openSUSE-SU-2019:2408",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html"
},
{
"name": "openSUSE-SU-2019:2435",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html"
},
{
"name": "https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=fee2cc29e888f2ced6a76990923aef19d326dc0e",
"refsource": "MISC",
"url": "https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=fee2cc29e888f2ced6a76990923aef19d326dc0e"
},
{
"name": "USN-4400-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4400-1/"
}
]
},
"source": {
"advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1150733",
"defect": [
"1150733"
],
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:linux-nfs:nfs-utils:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.3.0-34.18.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:linux-nfs:nfs-utils:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.1.1-6.10.2",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@suse.com",
"ID": "CVE-2019-3689"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1150733",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1150733"
},
{
"name": "[debian-lts-announce] 20191019 [SECURITY] [DLA 1965-1] nfs-utils security update",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html"
},
{
"name": "openSUSE-SU-2019:2408",
"refsource": "SUSE",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html"
},
{
"name": "openSUSE-SU-2019:2435",
"refsource": "SUSE",
"tags": [
"Vendor Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html"
},
{
"name": "https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=fee2cc29e888f2ced6a76990923aef19d326dc0e",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=fee2cc29e888f2ced6a76990923aef19d326dc0e"
},
{
"name": "USN-4400-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4400-1/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-11-25T18:51Z",
"publishedDate": "2019-09-19T14:15Z"
}
}
}
GHSA-QH2Q-M44H-CFM8
Vulnerability from github – Published: 2022-05-24 16:56 – Updated: 2022-05-24 16:56
VLAI?
Details
The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system if fs.protected_symlinks is not set
{
"affected": [],
"aliases": [
"CVE-2019-3689"
],
"database_specific": {
"cwe_ids": [
"CWE-276"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-09-19T14:15:00Z",
"severity": "HIGH"
},
"details": "The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system if fs.protected_symlinks is not set",
"id": "GHSA-qh2q-m44h-cfm8",
"modified": "2022-05-24T16:56:30Z",
"published": "2022-05-24T16:56:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3689"
},
{
"type": "WEB",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1150733"
},
{
"type": "WEB",
"url": "https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=fee2cc29e888f2ced6a76990923aef19d326dc0e"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4400-1"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
BDU:2021-00101
Vulnerability from fstec - Published: 17.09.2019
VLAI Severity ?
Title
Уязвимость функции nsm_drop_privileges (support/nsm/file.c пакета NFS утилит nfs-utils), связанная с неправельным присвоением стандартных разрешений, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность
Description
Уязвимость функции nsm_drop_privileges (support/nsm/file.c пакета NFS утилит nfs-utils) связана с неправельным присвоением стандартных разрешений. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить доступ к конфиденциальным данным, нарушить их целостность, а также обмануть процессы, запущенные с правами root, для создания / перезаписи файлов в любом месте системы
Severity ?
Vendor
Canonical Ltd., ООО «РусБИТех-Астра», Novell Inc., Сообщество свободного программного обеспечения, АО «Концерн ВНИИНС»
Software Name
Ubuntu, Astra Linux Special Edition (запись в едином реестре российских программ №369), Suse Linux Enterprise Server, Debian GNU/Linux, Suse Linux Enterprise Desktop, SUSE Enterprise Storage, SUSE Linux Enterprise Server for SAP Applications, SUSE OpenStack Cloud, Astra Linux Common Edition (запись в едином реестре российских программ №4433), OpenSUSE Leap, SUSE Linux Enterprise Module for Basesystem, SUSE CaaS Platform, SUSE OpenStack Cloud Crowbar, HPE Helion Openstack, Astra Linux Special Edition для «Эльбрус» (запись в едином реестре российских программ №11156), nfs-utils, ОС ОН «Стрелец» (запись в едином реестре российских программ №6177)
Software Version
16.04 LTS (Ubuntu), 1.5 «Смоленск» (Astra Linux Special Edition), 12 sp1 (Suse Linux Enterprise Server), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 1.6 «Смоленск» (Astra Linux Special Edition), 12 SP4 (Suse Linux Enterprise Desktop), 4 (SUSE Enterprise Storage), 12 SP2 (SUSE Linux Enterprise Server for SAP Applications), 12 SP3 (SUSE Linux Enterprise Server for SAP Applications), 7 (SUSE OpenStack Cloud), 12 SP4 (Suse Linux Enterprise Server), 12 SP1 LTSS (Suse Linux Enterprise Server), 12 SP2 LTSS (Suse Linux Enterprise Server), 12.04 ESM (Ubuntu), 2.12 «Орёл» (Astra Linux Common Edition), 15.0 (OpenSUSE Leap), 15 (SUSE Linux Enterprise Module for Basesystem), 15 SP1 (SUSE Linux Enterprise Module for Basesystem), 3.0 (SUSE CaaS Platform), 5 (SUSE Enterprise Storage), 12 SP2-BCL (Suse Linux Enterprise Server), 15.1 (OpenSUSE Leap), 12 SP3-LTSS (Suse Linux Enterprise Server), 14.04 ESM (Ubuntu), 8 (SUSE OpenStack Cloud), 12 SP3-BCL (Suse Linux Enterprise Server), 12 SP5 (Suse Linux Enterprise Server), 8 (SUSE OpenStack Cloud Crowbar), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 8 (HPE Helion Openstack), 19.10 (Ubuntu), 8.1 «Ленинград» (Astra Linux Special Edition для «Эльбрус»), 20.04 LTS (Ubuntu), 20.10 (Ubuntu), до 1.3.0-34.18.1 включительно (nfs-utils), до 2.1.1-6.10.2 включительно (nfs-utils), до 16.01.2023 (ОС ОН «Стрелец»)
Possible Mitigations
Использование рекомендаций производителя:
Для Debian GNU/Linux:
Обновление программного обеспечения (пакета nfs-utils) до 1:1.3.4-2.5+deb10u1 или более поздней версии
https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html
Для Novell Inc.:
https://www.suse.com/security/cve/CVE-2019-3689/
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html
https://bugzilla.suse.com/show_bug.cgi?id=1150733
Для Ubuntu:
https://usn.ubuntu.com/4400-1/
Для Astra Linux использование рекомендаций доступных по ссылке:
https://wiki.astralinux.ru/pages/viewpage.action?pageId=117998111
Или обновление программного обеспечения (пакета nfs-utils) до 1:1.3.4-2.5+deb10u1 или более поздней версии
Использование рекомендаций производителя:
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20210730SE16
https://wiki.astralinux.ru/astra-linux-se81-bulletin-20211019SE81
Для nfs-utils:
Обновление программного обеспечения до 1:1.3.4-4 или более поздней версии
Для ОС ОН «Стрелец»:
Обновление программного обеспечения nfs-utils до версии 1:1.3.4-2.5+deb10u1
Reference
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html
https://bugzilla.suse.com/show_bug.cgi?id=1150733
https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=fee2cc29e888f2ced6a76990923aef19d326dc0e
https://lists.debian.org/debian-lts-announce/2019/10/msg00026.html
https://nvd.nist.gov/vuln/detail/CVE-2019-3689
https://security-tracker.debian.org/tracker/CVE-2019-3689
https://usn.ubuntu.com/4400-1/
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20210611SE16
https://wiki.astralinux.ru/pages/viewpage.action?pageId=117998111
https://www.suse.com/security/cve/CVE-2019-3689/
https://wiki.astralinux.ru/astra-linux-se81-bulletin-20211019SE81
https://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023
CWE
CWE-276
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Canonical Ltd., \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Novell Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "16.04 LTS (Ubuntu), 1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 12 sp1 (Suse Linux Enterprise Server), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 12 SP4 (Suse Linux Enterprise Desktop), 4 (SUSE Enterprise Storage), 12 SP2 (SUSE Linux Enterprise Server for SAP Applications), 12 SP3 (SUSE Linux Enterprise Server for SAP Applications), 7 (SUSE OpenStack Cloud), 12 SP4 (Suse Linux Enterprise Server), 12 SP1 LTSS (Suse Linux Enterprise Server), 12 SP2 LTSS (Suse Linux Enterprise Server), 12.04 ESM (Ubuntu), 2.12 \u00ab\u041e\u0440\u0451\u043b\u00bb (Astra Linux Common Edition), 15.0 (OpenSUSE Leap), 15 (SUSE Linux Enterprise Module for Basesystem), 15 SP1 (SUSE Linux Enterprise Module for Basesystem), 3.0 (SUSE CaaS Platform), 5 (SUSE Enterprise Storage), 12 SP2-BCL (Suse Linux Enterprise Server), 15.1 (OpenSUSE Leap), 12 SP3-LTSS (Suse Linux Enterprise Server), 14.04 ESM (Ubuntu), 8 (SUSE OpenStack Cloud), 12 SP3-BCL (Suse Linux Enterprise Server), 12 SP5 (Suse Linux Enterprise Server), 8 (SUSE OpenStack Cloud Crowbar), 8 (Debian GNU/Linux), 10 (Debian GNU/Linux), 8 (HPE Helion Openstack), 19.10 (Ubuntu), 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb), 20.04 LTS (Ubuntu), 20.10 (Ubuntu), \u0434\u043e 1.3.0-34.18.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (nfs-utils), \u0434\u043e 2.1.1-6.10.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (nfs-utils), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\n\u0414\u043b\u044f Debian GNU/Linux:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 nfs-utils) \u0434\u043e 1:1.3.4-2.5+deb10u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\nhttps://lists.debian.org/debian-lts-announce/2019/10/msg00026.html\n\n\u0414\u043b\u044f Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2019-3689/\nhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html\nhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html\nhttps://bugzilla.suse.com/show_bug.cgi?id=1150733\n\n\u0414\u043b\u044f Ubuntu:\nhttps://usn.ubuntu.com/4400-1/\n\n\u0414\u043b\u044f Astra Linux \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u043f\u043e \u0441\u0441\u044b\u043b\u043a\u0435:\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=117998111\n\u0418\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 nfs-utils) \u0434\u043e 1:1.3.4-2.5+deb10u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20210730SE16\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20211019SE81\n\n\u0414\u043b\u044f nfs-utils:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 1:1.3.4-4 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f nfs-utils \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1:1.3.4-2.5+deb10u1",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "17.09.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.11.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "14.01.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-00101",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-3689",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Ubuntu, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Suse Linux Enterprise Server, Debian GNU/Linux, Suse Linux Enterprise Desktop, SUSE Enterprise Storage, SUSE Linux Enterprise Server for SAP Applications, SUSE OpenStack Cloud, Astra Linux Common Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164433), OpenSUSE Leap, SUSE Linux Enterprise Module for Basesystem, SUSE CaaS Platform, SUSE OpenStack Cloud Crowbar, HPE Helion Openstack, Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), nfs-utils, \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Canonical Ltd. Ubuntu 16.04 LTS 32-bit, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb 64-bit (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Novell Inc. Suse Linux Enterprise Server 12 sp1 64-bit, Canonical Ltd. Ubuntu 16.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Canonical Ltd. Ubuntu 18.04 LTS , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Novell Inc. Suse Linux Enterprise Desktop 12 SP4 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP2 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3 , Novell Inc. Suse Linux Enterprise Server 12 SP4 , Novell Inc. Suse Linux Enterprise Server 12 SP1 LTSS , Novell Inc. Suse Linux Enterprise Server 12 SP2 LTSS , Canonical Ltd. Ubuntu 12.04 ESM , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Common Edition 2.12 \u00ab\u041e\u0440\u0451\u043b\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164433), Novell Inc. OpenSUSE Leap 15.0 32-bit, Novell Inc. OpenSUSE Leap 15.0 , Novell Inc. Suse Linux Enterprise Server 12 SP2-BCL , Novell Inc. OpenSUSE Leap 15.1 , Novell Inc. Suse Linux Enterprise Server 12 SP3-LTSS , Canonical Ltd. Ubuntu 14.04 ESM , Novell Inc. Suse Linux Enterprise Server 12 SP3-BCL , Novell Inc. Suse Linux Enterprise Server 12 SP5 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Canonical Ltd. Ubuntu 19.10 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), Novell Inc. Suse Linux Enterprise Server 12 SP1 , Canonical Ltd. Ubuntu 20.04 LTS , Canonical Ltd. Ubuntu 20.10 , \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 nsm_drop_privileges (support/nsm/file.c \u043f\u0430\u043a\u0435\u0442\u0430 NFS \u0443\u0442\u0438\u043b\u0438\u0442 nfs-utils), \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0435\u043b\u044c\u043d\u044b\u043c \u043f\u0440\u0438\u0441\u0432\u043e\u0435\u043d\u0438\u0435\u043c \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u0439, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0435 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0435 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f (CWE-276)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 nsm_drop_privileges (support/nsm/file.c \u043f\u0430\u043a\u0435\u0442\u0430 NFS \u0443\u0442\u0438\u043b\u0438\u0442 nfs-utils) \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0435\u043b\u044c\u043d\u044b\u043c \u043f\u0440\u0438\u0441\u0432\u043e\u0435\u043d\u0438\u0435\u043c \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0445 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u0439. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c, \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0438\u0445 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u0431\u043c\u0430\u043d\u0443\u0442\u044c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u044b, \u0437\u0430\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0435 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 root, \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f / \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 \u043b\u044e\u0431\u043e\u043c \u043c\u0435\u0441\u0442\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00071.html\nhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00006.html\nhttps://bugzilla.suse.com/show_bug.cgi?id=1150733\nhttps://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=fee2cc29e888f2ced6a76990923aef19d326dc0e\nhttps://lists.debian.org/debian-lts-announce/2019/10/msg00026.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2019-3689\nhttps://security-tracker.debian.org/tracker/CVE-2019-3689\nhttps://usn.ubuntu.com/4400-1/\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20210611SE16\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=117998111\nhttps://www.suse.com/security/cve/CVE-2019-3689/\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20211019SE81\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-276",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,8)"
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…