<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">cifs-utils-6.5-1.5 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10334-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">cifs-utils-6.5-1.5 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the cifs-utils-6.5-1.5 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10334</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1886/</URL>
      <Description>SUSE CVE CVE-2009-1886 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1888/</URL>
      <Description>SUSE CVE CVE-2009-1888 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-2813/</URL>
      <Description>SUSE CVE CVE-2009-2813 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-2906/</URL>
      <Description>SUSE CVE CVE-2009-2906 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-2948/</URL>
      <Description>SUSE CVE CVE-2009-2948 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-0547/</URL>
      <Description>SUSE CVE CVE-2010-0547 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-0728/</URL>
      <Description>SUSE CVE CVE-2010-0728 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-0787/</URL>
      <Description>SUSE CVE CVE-2010-0787 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-1586/</URL>
      <Description>SUSE CVE CVE-2012-1586 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cifs-utils-6.5-1.5">
      <FullProductName ProductID="cifs-utils-6.5-1.5">cifs-utils-6.5-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cifs-utils-devel-6.5-1.5">
      <FullProductName ProductID="cifs-utils-devel-6.5-1.5">cifs-utils-devel-6.5-1.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pam_cifscreds-6.5-1.5">
      <FullProductName ProductID="pam_cifscreds-6.5-1.5">pam_cifscreds-6.5-1.5</FullProductName>
    </Branch>
    <Relationship ProductReference="cifs-utils-6.5-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cifs-utils-6.5-1.5">cifs-utils-6.5-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="cifs-utils-devel-6.5-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:cifs-utils-devel-6.5-1.5">cifs-utils-devel-6.5-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="pam_cifscreds-6.5-1.5" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:pam_cifscreds-6.5-1.5">pam_cifscreds-6.5-1.5 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename.</Note>
    </Notes>
    <CVE>CVE-2009-1886</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cifs-utils-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:cifs-utils-devel-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:pam_cifscreds-6.5-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1886.html</URL>
        <Description>CVE-2009-1886</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/513360</URL>
        <Description>SUSE Bug 513360</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/515479</URL>
        <Description>SUSE Bug 515479</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory.</Note>
    </Notes>
    <CVE>CVE-2009-1888</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cifs-utils-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:cifs-utils-devel-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:pam_cifscreds-6.5-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1888.html</URL>
        <Description>CVE-2009-1888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/513360</URL>
        <Description>SUSE Bug 513360</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/515479</URL>
        <Description>SUSE Bug 515479</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories.</Note>
    </Notes>
    <CVE>CVE-2009-2813</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cifs-utils-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:cifs-utils-devel-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:pam_cifscreds-6.5-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-2813.html</URL>
        <Description>CVE-2009-2813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/515479</URL>
        <Description>SUSE Bug 515479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/539517</URL>
        <Description>SUSE Bug 539517</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/543115</URL>
        <Description>SUSE Bug 543115</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.</Note>
    </Notes>
    <CVE>CVE-2009-2906</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cifs-utils-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:cifs-utils-devel-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:pam_cifscreds-6.5-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-2906.html</URL>
        <Description>CVE-2009-2906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/515479</URL>
        <Description>SUSE Bug 515479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/543115</URL>
        <Description>SUSE Bug 543115</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.</Note>
    </Notes>
    <CVE>CVE-2009-2948</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cifs-utils-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:cifs-utils-devel-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:pam_cifscreds-6.5-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-2948.html</URL>
        <Description>CVE-2009-2948</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/515479</URL>
        <Description>SUSE Bug 515479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/542150</URL>
        <Description>SUSE Bug 542150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/543115</URL>
        <Description>SUSE Bug 543115</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.</Note>
    </Notes>
    <CVE>CVE-2010-0547</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cifs-utils-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:cifs-utils-devel-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:pam_cifscreds-6.5-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-0547.html</URL>
        <Description>CVE-2010-0547</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/577868</URL>
        <Description>SUSE Bug 577868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/577925</URL>
        <Description>SUSE Bug 577925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/583535</URL>
        <Description>SUSE Bug 583535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/583536</URL>
        <Description>SUSE Bug 583536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/594263</URL>
        <Description>SUSE Bug 594263</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/597421</URL>
        <Description>SUSE Bug 597421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/602694</URL>
        <Description>SUSE Bug 602694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/709819</URL>
        <Description>SUSE Bug 709819</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">smbd in Samba 3.3.11, 3.4.6, and 3.5.0, when libcap support is enabled, runs with the CAP_DAC_OVERRIDE capability, which allows remote authenticated users to bypass intended file permissions via standard filesystem operations with any client.</Note>
    </Notes>
    <CVE>CVE-2010-0728</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cifs-utils-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:cifs-utils-devel-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:pam_cifscreds-6.5-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8.5</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-0728.html</URL>
        <Description>CVE-2010-0728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/586683</URL>
        <Description>SUSE Bug 586683</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.</Note>
    </Notes>
    <CVE>CVE-2010-0787</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cifs-utils-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:cifs-utils-devel-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:pam_cifscreds-6.5-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-0787.html</URL>
        <Description>CVE-2010-0787</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/550002</URL>
        <Description>SUSE Bug 550002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/602694</URL>
        <Description>SUSE Bug 602694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/620680</URL>
        <Description>SUSE Bug 620680</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.</Note>
    </Notes>
    <CVE>CVE-2012-1586</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:cifs-utils-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:cifs-utils-devel-6.5-1.5</ProductID>
        <ProductID>openSUSE Tumbleweed:pam_cifscreds-6.5-1.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-1586.html</URL>
        <Description>CVE-2012-1586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/754443</URL>
        <Description>SUSE Bug 754443</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
