Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-3297 (GCVE-0-2009-3297)
Vulnerability from cvelistv5 – Published: 2010-03-02 18:00 – Updated: 2024-09-16 19:14DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789. Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs. Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2010-03-02T18:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"rejectedReasons": [
{
"lang": "en",
"value": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789. Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs. Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-3297",
"datePublished": "2010-03-02T18:00:00Z",
"dateRejected": "2022-10-03T00:00:00",
"dateReserved": "2009-09-22T00:00:00Z",
"dateUpdated": "2024-09-16T19:14:19.755Z",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2009-3297\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-03-02T18:30:00.570\",\"lastModified\":\"2023-11-07T02:04:24.810\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789. Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs. Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage\"}],\"metrics\":{},\"references\":[]}}"
}
}
CERTA-2010-AVI-038
Vulnerability from certfr_avis - Published: 2010-01-29 - Updated: 2010-01-29
Une vulnérabilité permettant l'élévation de privilèges a été découverte dans Samba.
Description
Une vulnérabilité a été découverte dans Samba. Cette vulnérabilité est due à une erreur dans la gestion de l'utilitaire mount.cifs. L'exploitation de cette vulnérabilité permet de contourner la politique de sécurité mise en place et, éventuellement, d'acquérir des privilèges plus élevés dans le cas où mount.cifs est configuré avec un suid root.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Samba versions 3.x.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eSamba versions 3.x.\u003c/p\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Samba. Cette vuln\u00e9rabilit\u00e9 est\ndue \u00e0 une erreur dans la gestion de l\u0027utilitaire mount.cifs.\nL\u0027exploitation de cette vuln\u00e9rabilit\u00e9 permet de contourner la politique\nde s\u00e9curit\u00e9 mise en place et, \u00e9ventuellement, d\u0027acqu\u00e9rir des privil\u00e8ges\nplus \u00e9lev\u00e9s dans le cas o\u00f9 mount.cifs est configur\u00e9 avec un suid root.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3297",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3297"
}
],
"initial_release_date": "2010-01-29T00:00:00",
"last_revision_date": "2010-01-29T00:00:00",
"links": [],
"reference": "CERTA-2010-AVI-038",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-01-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 permettant l\u0027\u00e9l\u00e9vation de privil\u00e8ges a \u00e9t\u00e9 d\u00e9couverte\ndans Samba.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Samba",
"vendor_advisories": [
{
"published_at": null,
"title": "Report de bogue Samba num\u00e9ro 6853 du 26 janvier 2010",
"url": "http://bugzilla.samba.org/show_bug.cgi?id=6853"
},
{
"published_at": null,
"title": "Report de bogue Red Hat num\u00e9ro 532940 du 28 janvier 2010",
"url": "http://bugzilla.redhat.com/show_bug.cgi?id=532940"
}
]
}
OPENSUSE-SU-2024:10378-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "fuse-2.9.5-1.6 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the fuse-2.9.5-1.6 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10378",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10378-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3297 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3297/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-0541 page",
"url": "https://www.suse.com/security/cve/CVE-2011-0541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3202 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3202/"
}
],
"title": "fuse-2.9.5-1.6 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10378-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "fuse-2.9.5-1.6.aarch64",
"product": {
"name": "fuse-2.9.5-1.6.aarch64",
"product_id": "fuse-2.9.5-1.6.aarch64"
}
},
{
"category": "product_version",
"name": "fuse-devel-2.9.5-1.6.aarch64",
"product": {
"name": "fuse-devel-2.9.5-1.6.aarch64",
"product_id": "fuse-devel-2.9.5-1.6.aarch64"
}
},
{
"category": "product_version",
"name": "fuse-devel-static-2.9.5-1.6.aarch64",
"product": {
"name": "fuse-devel-static-2.9.5-1.6.aarch64",
"product_id": "fuse-devel-static-2.9.5-1.6.aarch64"
}
},
{
"category": "product_version",
"name": "libfuse2-2.9.5-1.6.aarch64",
"product": {
"name": "libfuse2-2.9.5-1.6.aarch64",
"product_id": "libfuse2-2.9.5-1.6.aarch64"
}
},
{
"category": "product_version",
"name": "libfuse2-32bit-2.9.5-1.6.aarch64",
"product": {
"name": "libfuse2-32bit-2.9.5-1.6.aarch64",
"product_id": "libfuse2-32bit-2.9.5-1.6.aarch64"
}
},
{
"category": "product_version",
"name": "libulockmgr1-2.9.5-1.6.aarch64",
"product": {
"name": "libulockmgr1-2.9.5-1.6.aarch64",
"product_id": "libulockmgr1-2.9.5-1.6.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fuse-2.9.5-1.6.ppc64le",
"product": {
"name": "fuse-2.9.5-1.6.ppc64le",
"product_id": "fuse-2.9.5-1.6.ppc64le"
}
},
{
"category": "product_version",
"name": "fuse-devel-2.9.5-1.6.ppc64le",
"product": {
"name": "fuse-devel-2.9.5-1.6.ppc64le",
"product_id": "fuse-devel-2.9.5-1.6.ppc64le"
}
},
{
"category": "product_version",
"name": "fuse-devel-static-2.9.5-1.6.ppc64le",
"product": {
"name": "fuse-devel-static-2.9.5-1.6.ppc64le",
"product_id": "fuse-devel-static-2.9.5-1.6.ppc64le"
}
},
{
"category": "product_version",
"name": "libfuse2-2.9.5-1.6.ppc64le",
"product": {
"name": "libfuse2-2.9.5-1.6.ppc64le",
"product_id": "libfuse2-2.9.5-1.6.ppc64le"
}
},
{
"category": "product_version",
"name": "libfuse2-32bit-2.9.5-1.6.ppc64le",
"product": {
"name": "libfuse2-32bit-2.9.5-1.6.ppc64le",
"product_id": "libfuse2-32bit-2.9.5-1.6.ppc64le"
}
},
{
"category": "product_version",
"name": "libulockmgr1-2.9.5-1.6.ppc64le",
"product": {
"name": "libulockmgr1-2.9.5-1.6.ppc64le",
"product_id": "libulockmgr1-2.9.5-1.6.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fuse-2.9.5-1.6.s390x",
"product": {
"name": "fuse-2.9.5-1.6.s390x",
"product_id": "fuse-2.9.5-1.6.s390x"
}
},
{
"category": "product_version",
"name": "fuse-devel-2.9.5-1.6.s390x",
"product": {
"name": "fuse-devel-2.9.5-1.6.s390x",
"product_id": "fuse-devel-2.9.5-1.6.s390x"
}
},
{
"category": "product_version",
"name": "fuse-devel-static-2.9.5-1.6.s390x",
"product": {
"name": "fuse-devel-static-2.9.5-1.6.s390x",
"product_id": "fuse-devel-static-2.9.5-1.6.s390x"
}
},
{
"category": "product_version",
"name": "libfuse2-2.9.5-1.6.s390x",
"product": {
"name": "libfuse2-2.9.5-1.6.s390x",
"product_id": "libfuse2-2.9.5-1.6.s390x"
}
},
{
"category": "product_version",
"name": "libfuse2-32bit-2.9.5-1.6.s390x",
"product": {
"name": "libfuse2-32bit-2.9.5-1.6.s390x",
"product_id": "libfuse2-32bit-2.9.5-1.6.s390x"
}
},
{
"category": "product_version",
"name": "libulockmgr1-2.9.5-1.6.s390x",
"product": {
"name": "libulockmgr1-2.9.5-1.6.s390x",
"product_id": "libulockmgr1-2.9.5-1.6.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fuse-2.9.5-1.6.x86_64",
"product": {
"name": "fuse-2.9.5-1.6.x86_64",
"product_id": "fuse-2.9.5-1.6.x86_64"
}
},
{
"category": "product_version",
"name": "fuse-devel-2.9.5-1.6.x86_64",
"product": {
"name": "fuse-devel-2.9.5-1.6.x86_64",
"product_id": "fuse-devel-2.9.5-1.6.x86_64"
}
},
{
"category": "product_version",
"name": "fuse-devel-static-2.9.5-1.6.x86_64",
"product": {
"name": "fuse-devel-static-2.9.5-1.6.x86_64",
"product_id": "fuse-devel-static-2.9.5-1.6.x86_64"
}
},
{
"category": "product_version",
"name": "libfuse2-2.9.5-1.6.x86_64",
"product": {
"name": "libfuse2-2.9.5-1.6.x86_64",
"product_id": "libfuse2-2.9.5-1.6.x86_64"
}
},
{
"category": "product_version",
"name": "libfuse2-32bit-2.9.5-1.6.x86_64",
"product": {
"name": "libfuse2-32bit-2.9.5-1.6.x86_64",
"product_id": "libfuse2-32bit-2.9.5-1.6.x86_64"
}
},
{
"category": "product_version",
"name": "libulockmgr1-2.9.5-1.6.x86_64",
"product": {
"name": "libulockmgr1-2.9.5-1.6.x86_64",
"product_id": "libulockmgr1-2.9.5-1.6.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-2.9.5-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fuse-2.9.5-1.6.aarch64"
},
"product_reference": "fuse-2.9.5-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-2.9.5-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fuse-2.9.5-1.6.ppc64le"
},
"product_reference": "fuse-2.9.5-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-2.9.5-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fuse-2.9.5-1.6.s390x"
},
"product_reference": "fuse-2.9.5-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-2.9.5-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fuse-2.9.5-1.6.x86_64"
},
"product_reference": "fuse-2.9.5-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-devel-2.9.5-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.aarch64"
},
"product_reference": "fuse-devel-2.9.5-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-devel-2.9.5-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.ppc64le"
},
"product_reference": "fuse-devel-2.9.5-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-devel-2.9.5-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.s390x"
},
"product_reference": "fuse-devel-2.9.5-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-devel-2.9.5-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.x86_64"
},
"product_reference": "fuse-devel-2.9.5-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-devel-static-2.9.5-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.aarch64"
},
"product_reference": "fuse-devel-static-2.9.5-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-devel-static-2.9.5-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.ppc64le"
},
"product_reference": "fuse-devel-static-2.9.5-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-devel-static-2.9.5-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.s390x"
},
"product_reference": "fuse-devel-static-2.9.5-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-devel-static-2.9.5-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.x86_64"
},
"product_reference": "fuse-devel-static-2.9.5-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfuse2-2.9.5-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfuse2-2.9.5-1.6.aarch64"
},
"product_reference": "libfuse2-2.9.5-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfuse2-2.9.5-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfuse2-2.9.5-1.6.ppc64le"
},
"product_reference": "libfuse2-2.9.5-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfuse2-2.9.5-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfuse2-2.9.5-1.6.s390x"
},
"product_reference": "libfuse2-2.9.5-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfuse2-2.9.5-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfuse2-2.9.5-1.6.x86_64"
},
"product_reference": "libfuse2-2.9.5-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfuse2-32bit-2.9.5-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.aarch64"
},
"product_reference": "libfuse2-32bit-2.9.5-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfuse2-32bit-2.9.5-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.ppc64le"
},
"product_reference": "libfuse2-32bit-2.9.5-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfuse2-32bit-2.9.5-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.s390x"
},
"product_reference": "libfuse2-32bit-2.9.5-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfuse2-32bit-2.9.5-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.x86_64"
},
"product_reference": "libfuse2-32bit-2.9.5-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libulockmgr1-2.9.5-1.6.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.aarch64"
},
"product_reference": "libulockmgr1-2.9.5-1.6.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libulockmgr1-2.9.5-1.6.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.ppc64le"
},
"product_reference": "libulockmgr1-2.9.5-1.6.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libulockmgr1-2.9.5-1.6.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.s390x"
},
"product_reference": "libulockmgr1-2.9.5-1.6.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libulockmgr1-2.9.5-1.6.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.x86_64"
},
"product_reference": "libulockmgr1-2.9.5-1.6.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-3297",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3297"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789. Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs. Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fuse-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3297",
"url": "https://www.suse.com/security/cve/CVE-2009-3297"
},
{
"category": "external",
"summary": "SUSE Bug 550002 for CVE-2009-3297",
"url": "https://bugzilla.suse.com/550002"
},
{
"category": "external",
"summary": "SUSE Bug 550003 for CVE-2009-3297",
"url": "https://bugzilla.suse.com/550003"
},
{
"category": "external",
"summary": "SUSE Bug 550004 for CVE-2009-3297",
"url": "https://bugzilla.suse.com/550004"
},
{
"category": "external",
"summary": "SUSE Bug 577925 for CVE-2009-3297",
"url": "https://bugzilla.suse.com/577925"
},
{
"category": "external",
"summary": "SUSE Bug 583535 for CVE-2009-3297",
"url": "https://bugzilla.suse.com/583535"
},
{
"category": "external",
"summary": "SUSE Bug 583536 for CVE-2009-3297",
"url": "https://bugzilla.suse.com/583536"
},
{
"category": "external",
"summary": "SUSE Bug 594263 for CVE-2009-3297",
"url": "https://bugzilla.suse.com/594263"
},
{
"category": "external",
"summary": "SUSE Bug 620680 for CVE-2009-3297",
"url": "https://bugzilla.suse.com/620680"
},
{
"category": "external",
"summary": "SUSE Bug 651598 for CVE-2009-3297",
"url": "https://bugzilla.suse.com/651598"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fuse-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2009-3297"
},
{
"cve": "CVE-2011-0541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-0541"
}
],
"notes": [
{
"category": "general",
"text": "fuse 2.8.5 and earlier does not properly handle when /etc/mtab cannot be updated, which allows local users to unmount arbitrary directories via a symlink attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fuse-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-0541",
"url": "https://www.suse.com/security/cve/CVE-2011-0541"
},
{
"category": "external",
"summary": "SUSE Bug 668820 for CVE-2011-0541",
"url": "https://bugzilla.suse.com/668820"
},
{
"category": "external",
"summary": "SUSE Bug 685055 for CVE-2011-0541",
"url": "https://bugzilla.suse.com/685055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fuse-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2011-0541"
},
{
"cve": "CVE-2015-3202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3202"
}
],
"notes": [
{
"category": "general",
"text": "fusermount in FUSE before 2.9.3-15 does not properly clear the environment before invoking (1) mount or (2) umount as root, which allows local users to write to arbitrary files via a crafted LIBMOUNT_MTAB environment variable that is used by mount\u0027s debugging feature.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fuse-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3202",
"url": "https://www.suse.com/security/cve/CVE-2015-3202"
},
{
"category": "external",
"summary": "SUSE Bug 931452 for CVE-2015-3202",
"url": "https://bugzilla.suse.com/931452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fuse-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-devel-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:fuse-devel-static-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libfuse2-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libfuse2-32bit-2.9.5-1.6.x86_64",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.aarch64",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.ppc64le",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.s390x",
"openSUSE Tumbleweed:libulockmgr1-2.9.5-1.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-3202"
}
]
}
FKIE_CVE-2009-3297
Vulnerability from fkie_nvd - Published: 2010-03-02 18:30 - Updated: 2023-11-07 02:04| URL | Tags |
|---|
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789. Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs. Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
],
"id": "CVE-2009-3297",
"lastModified": "2023-11-07T02:04:24.810",
"metrics": {},
"published": "2010-03-02T18:30:00.570",
"references": [],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Rejected"
}
GSD-2009-3297
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-3297",
"description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789. Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs. Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"id": "GSD-2009-3297",
"references": [
"https://www.suse.com/security/cve/CVE-2009-3297.html",
"https://www.debian.org/security/2010/dsa-2004",
"https://www.debian.org/security/2010/dsa-1989"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-3297"
],
"details": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789. Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs. Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"id": "GSD-2009-3297",
"modified": "2023-12-13T01:19:49.047355Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-3297",
"STATE": "REJECT"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789. Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs. Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
]
}
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.