<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ntfs-3g_ntfsprogs</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:1244-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-09-09T06:21:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-09-09T06:21:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-09-09T06:21:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ntfs-3g_ntfsprogs</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for ntfs-3g_ntfsprogs fixes the following issues:

Update to version 2021.8.22 (bsc#1189720):

* Fixed compile error when building with libfuse &lt; 2.8.0
* Fixed obsolete macros in configure.ac
* Signalled support of UTIME_OMIT to external libfuse2
* Fixed an improper macro usage in ntfscp.c
* Updated the repository change in the README
* Fixed vulnerability threats caused by maliciously tampered NTFS partitions
* Security fixes: CVE-2021-33285, CVE-2021-33286, CVE-2021-33287,
  CVE-2021-33289, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268,
  CVE-2021-35269, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253,
  CVE_2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257,
  CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261,
  CVE-2021-39262, CVE-2021-39263.

- Library soversion is now 89

* Changes in version 2017.3.23
* Delegated processing of special reparse points to external plugins
* Allowed kernel cacheing by lowntfs-3g when not using Posix ACLs
* Enabled fallback to read-only mount when the volume is hibernated
* Made a full check for whether an extended attribute is allowed
* Moved secaudit and usermap to ntfsprogs (now ntfssecaudit and ntfsusermap)
* Enabled encoding broken UTF-16 into broken UTF-8
* Autoconfigured selecting &lt;sys/sysmacros.h&gt; vs &lt;sys/mkdev&gt;
* Allowed using the full library API on systems without extended attributes support
* Fixed DISABLE_PLUGINS as the condition for not using plugins
* Corrected validation of multi sector transfer protected records
* Denied creating/removing files from $Extend
* Returned the size of locale encoded target as the size of symlinks

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-1244</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:1244-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1189720</URL>
      <Description>SUSE Bug 1189720</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9755/</URL>
      <Description>SUSE CVE CVE-2019-9755 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-33285/</URL>
      <Description>SUSE CVE CVE-2021-33285 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-33286/</URL>
      <Description>SUSE CVE CVE-2021-33286 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-33287/</URL>
      <Description>SUSE CVE CVE-2021-33287 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-33289/</URL>
      <Description>SUSE CVE CVE-2021-33289 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-35266/</URL>
      <Description>SUSE CVE CVE-2021-35266 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-35267/</URL>
      <Description>SUSE CVE CVE-2021-35267 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-35268/</URL>
      <Description>SUSE CVE CVE-2021-35268 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-35269/</URL>
      <Description>SUSE CVE CVE-2021-35269 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-39251/</URL>
      <Description>SUSE CVE CVE-2021-39251 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-39252/</URL>
      <Description>SUSE CVE CVE-2021-39252 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-39253/</URL>
      <Description>SUSE CVE CVE-2021-39253 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-39255/</URL>
      <Description>SUSE CVE CVE-2021-39255 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-39256/</URL>
      <Description>SUSE CVE CVE-2021-39256 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-39257/</URL>
      <Description>SUSE CVE CVE-2021-39257 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-39258/</URL>
      <Description>SUSE CVE CVE-2021-39258 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-39259/</URL>
      <Description>SUSE CVE CVE-2021-39259 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-39260/</URL>
      <Description>SUSE CVE CVE-2021-39260 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-39261/</URL>
      <Description>SUSE CVE CVE-2021-39261 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-39262/</URL>
      <Description>SUSE CVE CVE-2021-39262 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-39263/</URL>
      <Description>SUSE CVE CVE-2021-39263 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libntfs-3g-devel-2021.8.22-lp152.5.3.1">
      <FullProductName ProductID="libntfs-3g-devel-2021.8.22-lp152.5.3.1">libntfs-3g-devel-2021.8.22-lp152.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libntfs-3g87-2021.8.22-lp152.5.3.1">
      <FullProductName ProductID="libntfs-3g87-2021.8.22-lp152.5.3.1">libntfs-3g87-2021.8.22-lp152.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ntfs-3g-2021.8.22-lp152.5.3.1">
      <FullProductName ProductID="ntfs-3g-2021.8.22-lp152.5.3.1">ntfs-3g-2021.8.22-lp152.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ntfsprogs-2021.8.22-lp152.5.3.1">
      <FullProductName ProductID="ntfsprogs-2021.8.22-lp152.5.3.1">ntfsprogs-2021.8.22-lp152.5.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ntfsprogs-extra-2021.8.22-lp152.5.3.1">
      <FullProductName ProductID="ntfsprogs-extra-2021.8.22-lp152.5.3.1">ntfsprogs-extra-2021.8.22-lp152.5.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libntfs-3g-devel-2021.8.22-lp152.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1">libntfs-3g-devel-2021.8.22-lp152.5.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libntfs-3g87-2021.8.22-lp152.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1">libntfs-3g87-2021.8.22-lp152.5.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ntfs-3g-2021.8.22-lp152.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1">ntfs-3g-2021.8.22-lp152.5.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ntfsprogs-2021.8.22-lp152.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1">ntfsprogs-2021.8.22-lp152.5.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ntfsprogs-extra-2021.8.22-lp152.5.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1">ntfsprogs-extra-2021.8.22-lp152.5.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.</Note>
    </Notes>
    <CVE>CVE-2019-9755</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9755.html</URL>
        <Description>CVE-2019-9755</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1130165</URL>
        <Description>SUSE Bug 1130165</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In NTFS-3G versions &lt; 2021.8.22, when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value, a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the "bytes_in_use" field should be less than the "bytes_allocated" field. When it is not, the parsing of the records proceeds into the wild.</Note>
    </Notes>
    <CVE>CVE-2021-33285</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-33285.html</URL>
        <Description>CVE-2021-33285</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In NTFS-3G versions &lt; 2021.8.22, when a specially crafted unicode string is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution.</Note>
    </Notes>
    <CVE>CVE-2021-33286</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-33286.html</URL>
        <Description>CVE-2021-33286</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In NTFS-3G versions &lt; 2021.8.22, when specially crafted NTFS attributes are read in the function ntfs_attr_pread_i, a heap buffer overflow can occur and allow for writing to arbitrary memory or denial of service of the application.</Note>
    </Notes>
    <CVE>CVE-2021-33287</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-33287.html</URL>
        <Description>CVE-2021-33287</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In NTFS-3G versions &lt; 2021.8.22, when a specially crafted MFT section is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution.</Note>
    </Notes>
    <CVE>CVE-2021-33289</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-33289.html</URL>
        <Description>CVE-2021-33289</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In NTFS-3G versions &lt; 2021.8.22, when a specially crafted NTFS inode pathname is supplied in an NTFS image a heap buffer overflow can occur resulting in memory disclosure, denial of service and even code execution.</Note>
    </Notes>
    <CVE>CVE-2021-35266</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-35266.html</URL>
        <Description>CVE-2021-35266</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTFS-3G versions &lt; 2021.8.22, a stack buffer overflow can occur when correcting differences in the MFT and MFTMirror allowing for code execution or escalation of privileges when setuid-root.</Note>
    </Notes>
    <CVE>CVE-2021-35267</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-35267.html</URL>
        <Description>CVE-2021-35267</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In NTFS-3G versions &lt; 2021.8.22, when a specially crafted NTFS inode is loaded in the function ntfs_inode_real_open, a heap buffer overflow can occur allowing for code execution and escalation of privileges.</Note>
    </Notes>
    <CVE>CVE-2021-35268</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-35268.html</URL>
        <Description>CVE-2021-35268</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NTFS-3G versions &lt; 2021.8.22, when a specially crafted NTFS attribute from the MFT is setup in the function ntfs_attr_setup_flag, a heap buffer overflow can occur allowing for code execution and escalation of privileges.</Note>
    </Notes>
    <CVE>CVE-2021-35269</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-35269.html</URL>
        <Description>CVE-2021-35269</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted NTFS image can cause a NULL pointer dereference in ntfs_extent_inode_open in NTFS-3G &lt; 2021.8.22.</Note>
    </Notes>
    <CVE>CVE-2021-39251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-39251.html</URL>
        <Description>CVE-2021-39251</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted NTFS image can cause an out-of-bounds read in ntfs_ie_lookup in NTFS-3G &lt; 2021.8.22.</Note>
    </Notes>
    <CVE>CVE-2021-39252</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-39252.html</URL>
        <Description>CVE-2021-39252</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted NTFS image can cause an out-of-bounds read in ntfs_runlists_merge_i in NTFS-3G &lt; 2021.8.22.</Note>
    </Notes>
    <CVE>CVE-2021-39253</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-39253.html</URL>
        <Description>CVE-2021-39253</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted NTFS image can trigger an out-of-bounds read, caused by an invalid attribute in ntfs_attr_find_in_attrdef, in NTFS-3G &lt; 2021.8.22.</Note>
    </Notes>
    <CVE>CVE-2021-39255</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-39255.html</URL>
        <Description>CVE-2021-39255</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted NTFS image can cause a heap-based buffer overflow in ntfs_inode_lookup_by_name in NTFS-3G &lt; 2021.8.22.</Note>
    </Notes>
    <CVE>CVE-2021-39256</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-39256.html</URL>
        <Description>CVE-2021-39256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted NTFS image with an unallocated bitmap can lead to a endless recursive function call chain (starting from ntfs_attr_pwrite), causing stack consumption in NTFS-3G &lt; 2021.8.22.</Note>
    </Notes>
    <CVE>CVE-2021-39257</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-39257.html</URL>
        <Description>CVE-2021-39257</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted NTFS image can cause out-of-bounds reads in ntfs_attr_find and ntfs_external_attr_find in NTFS-3G &lt; 2021.8.22.</Note>
    </Notes>
    <CVE>CVE-2021-39258</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-39258.html</URL>
        <Description>CVE-2021-39258</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted NTFS image can trigger an out-of-bounds access, caused by an unsanitized attribute length in ntfs_inode_lookup_by_name, in NTFS-3G &lt; 2021.8.22.</Note>
    </Notes>
    <CVE>CVE-2021-39259</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-39259.html</URL>
        <Description>CVE-2021-39259</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted NTFS image can cause an out-of-bounds access in ntfs_inode_sync_standard_information in NTFS-3G &lt; 2021.8.22.</Note>
    </Notes>
    <CVE>CVE-2021-39260</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-39260.html</URL>
        <Description>CVE-2021-39260</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted NTFS image can cause a heap-based buffer overflow in ntfs_compressed_pwrite in NTFS-3G &lt; 2021.8.22.</Note>
    </Notes>
    <CVE>CVE-2021-39261</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-39261.html</URL>
        <Description>CVE-2021-39261</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted NTFS image can cause an out-of-bounds access in ntfs_decompress in NTFS-3G &lt; 2021.8.22.</Note>
    </Notes>
    <CVE>CVE-2021-39262</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-39262.html</URL>
        <Description>CVE-2021-39262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A crafted NTFS image can trigger a heap-based buffer overflow, caused by an unsanitized attribute in ntfs_get_attribute_value, in NTFS-3G &lt; 2021.8.22.</Note>
    </Notes>
    <CVE>CVE-2021-39263</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libntfs-3g-devel-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libntfs-3g87-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfs-3g-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-2021.8.22-lp152.5.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:ntfsprogs-extra-2021.8.22-lp152.5.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6I22R7EMWP6WBQIXDCKB4KJMMB67TMZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-39263.html</URL>
        <Description>CVE-2021-39263</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
