{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2008-6800","title":"Title"},{"category":"description","text":"DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is not a security issue.  It was originally created based on one vendor's misinterpretation of an upstream changelog comment that referred to a race condition in the winbind daemon (aka winbindd) in Samba before 3.0.32.  The upstream vendor states: \"The Samba Team sees no way to exploit this race condition by a user of the system or an external attacker. In order to be able to trigger the race condition a privileged user (root) need to intentionally kill a winbind child process and carefully time the killing to trigger the race condition. Although, if the user is already privileged, it can more easily just kill the parent process directly.\"  CVE concurs with the dispute.  Notes: CVE users should not use this identifier","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2008-6800","url":"https://www.suse.com/security/cve/CVE-2008-6800"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 502093 for CVE-2008-6800","url":"https://bugzilla.suse.com/502093"}],"title":"SUSE CVE CVE-2008-6800","tracking":{"current_release_date":"2025-07-09T00:15:55Z","generator":{"date":"2023-02-15T06:05:44Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2008-6800","initial_release_date":"2023-02-15T06:05:44Z","revision_history":[{"date":"2023-02-15T06:05:44Z","number":"2","summary":"Current version"},{"date":"2025-07-08T00:32:44Z","number":"3","summary":"Current version"},{"date":"2025-07-09T00:15:55Z","number":"4","summary":"Current version"}],"status":"interim","version":"4"}}}