|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-4132: kernel-source-azure,kernel-source,kernel-source-rt: smsusb: use-after-free caused by do_submit_urb() | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Cathy Hu <cathy.hu> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | jlee, oneukum, rfrohl, security-team, vasant.karasulli |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/374116/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-4132:6.2:(AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Cathy Hu
2023-08-04 06:17:20 UTC
Fixing commits: https://github.com/torvalds/linux/commit/ebad8e731c1c06adf04621d6fd327b860c0861b5 https://github.com/torvalds/linux/commit/6f489a966fbeb0da63d45c2c66a8957eab604bf6 Commit introducing the issue: https://github.com/torvalds/linux/commit/dd47fbd40e6ea6884e295e13a2e50b0894258fdf Affected: - SLE12-SP5 - cve/linux-4.12 - cve/linux-5.3 Not affected (introducing commit and fixing commits included): - SLE15-SP4-AZURE - SLE15-SP4-RT - SLE15-SP4 - SLE15-SP5 - SLE15-SP5-AZURE - SLE15-SP5-RT - ALP-current - stable Not affected (no introducing commit): - cve/linux-3.0 - cve/linux-4.4 (In reply to Hu from comment #1) > Fixing commits: > https://github.com/torvalds/linux/commit/ > ebad8e731c1c06adf04621d6fd327b860c0861b5 > https://github.com/torvalds/linux/commit/ > 6f489a966fbeb0da63d45c2c66a8957eab604bf6 > > Commit introducing the issue: > https://github.com/torvalds/linux/commit/ > dd47fbd40e6ea6884e295e13a2e50b0894258fdf > > Affected: > - SLE12-SP5 > - cve/linux-4.12 > - cve/linux-5.3 > hm... I didn't see drivers/media/usb/siano/ in supported.conf in the above version. Actually I also didn't find siano in supported.conf in 15-SP5. Maybe we didn't support siano device in SLE. Hi Oliver Could you please help to confirm the supporting or siano USB device? Thank a lot! > Not affected (introducing commit and fixing commits included): > - SLE15-SP4-AZURE > - SLE15-SP4-RT > - SLE15-SP4 > - SLE15-SP5 > - SLE15-SP5-AZURE > - SLE15-SP5-RT > - ALP-current > - stable > > Not affected (no introducing commit): > - cve/linux-3.0 > - cve/linux-4.4 (In reply to Joey Lee from comment #2) > hm... I didn't see drivers/media/usb/siano/ in supported.conf in the above > version. Actually I also didn't find siano in supported.conf in 15-SP5. > > Maybe we didn't support siano device in SLE. We do not, but I fail to see why that matters. The driver is compiled. If that is the case we are vulnerable because an attacker can use the known IDs. I am applying the patches to the affected trees. Fixes submitted SUSE-SU-2023:3601-1: An update that solves 16 vulnerabilities, contains one feature and has 29 security fixes can now be installed. Category: security (important) Bug References: 1120059, 1203517, 1210327, 1210448, 1212051, 1213543, 1213546, 1213601, 1213666, 1213899, 1213904, 1213906, 1213908, 1213910, 1213911, 1213912, 1213921, 1213927, 1213969, 1213970, 1213971, 1214019, 1214149, 1214157, 1214209, 1214233, 1214299, 1214335, 1214348, 1214350, 1214451, 1214453, 1214752, 1214928, 1215028, 1215032, 1215034, 1215035, 1215036, 1215037, 1215038, 1215041, 1215046, 1215049, 1215057 CVE References: CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459 Jira References: PED-4579 Sources used: SUSE Linux Enterprise Real Time 12 SP5 (src): kernel-syms-rt-4.12.14-10.141.1, kernel-source-rt-4.12.14-10.141.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3680-1: An update that solves 12 vulnerabilities can now be installed. Category: security (important) Bug References: 1203517, 1210448, 1213543, 1213601, 1213666, 1213927, 1213969, 1213971, 1214149, 1214348, 1214350, 1214451 CVE References: CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-4128, CVE-2023-4132, CVE-2023-4134, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459 Sources used: SUSE Linux Enterprise Live Patching 15-SP1 (src): kernel-livepatch-SLE15-SP1_Update_44-1-150100.3.3.1 SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): kernel-source-4.12.14-150100.197.157.1, kernel-obs-build-4.12.14-150100.197.157.1, kernel-syms-4.12.14-150100.197.157.1 SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): kernel-source-4.12.14-150100.197.157.1, kernel-obs-build-4.12.14-150100.197.157.1, kernel-syms-4.12.14-150100.197.157.1 SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): kernel-source-4.12.14-150100.197.157.1, kernel-obs-build-4.12.14-150100.197.157.1, kernel-syms-4.12.14-150100.197.157.1 SUSE CaaS Platform 4.0 (src): kernel-source-4.12.14-150100.197.157.1, kernel-obs-build-4.12.14-150100.197.157.1, kernel-syms-4.12.14-150100.197.157.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3684-1: An update that solves 17 vulnerabilities, contains two features and has four security fixes can now be installed. Category: security (important) Bug References: 1023051, 1203517, 1210448, 1213272, 1213546, 1213601, 1213666, 1213916, 1213927, 1213968, 1213969, 1213970, 1213971, 1214019, 1214120, 1214149, 1214275, 1214297, 1214348, 1214350, 1214451 CVE References: CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-21400, CVE-2023-34319, CVE-2023-3772, CVE-2023-3863, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459 Jira References: PED-4579, PED-5738 Sources used: SUSE Linux Enterprise Live Patching 15-SP3 (src): kernel-livepatch-SLE15-SP3_Update_36-1-150300.7.3.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1, kernel-source-5.3.18-150300.59.133.1, kernel-syms-5.3.18-150300.59.133.1, kernel-obs-build-5.3.18-150300.59.133.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1, kernel-source-5.3.18-150300.59.133.1, kernel-syms-5.3.18-150300.59.133.1, kernel-obs-build-5.3.18-150300.59.133.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1, kernel-source-5.3.18-150300.59.133.1, kernel-syms-5.3.18-150300.59.133.1, kernel-obs-build-5.3.18-150300.59.133.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1, kernel-source-5.3.18-150300.59.133.1, kernel-syms-5.3.18-150300.59.133.1, kernel-obs-build-5.3.18-150300.59.133.1 SUSE Manager Proxy 4.2 (src): kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1, kernel-source-5.3.18-150300.59.133.1 SUSE Manager Retail Branch Server 4.2 (src): kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1, kernel-source-5.3.18-150300.59.133.1 SUSE Manager Server 4.2 (src): kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1, kernel-source-5.3.18-150300.59.133.1 SUSE Enterprise Storage 7.1 (src): kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1, kernel-source-5.3.18-150300.59.133.1, kernel-syms-5.3.18-150300.59.133.1, kernel-obs-build-5.3.18-150300.59.133.1 SUSE Linux Enterprise Micro 5.1 (src): kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 SUSE Linux Enterprise Micro 5.2 (src): kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): kernel-default-base-5.3.18-150300.59.133.1.150300.18.78.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3681-1: An update that solves 16 vulnerabilities, contains two features and has 29 security fixes can now be installed. Category: security (important) Bug References: 1120059, 1203517, 1210327, 1210448, 1212051, 1213543, 1213546, 1213601, 1213666, 1213899, 1213904, 1213906, 1213908, 1213910, 1213911, 1213912, 1213921, 1213927, 1213969, 1213970, 1213971, 1214019, 1214149, 1214157, 1214209, 1214233, 1214299, 1214335, 1214348, 1214350, 1214451, 1214453, 1214752, 1214928, 1215028, 1215032, 1215034, 1215035, 1215036, 1215037, 1215038, 1215041, 1215046, 1215049, 1215057 CVE References: CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459 Jira References: PED-4579, SLE-18779 Sources used: SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): kernel-source-azure-4.12.14-16.149.1, kernel-syms-azure-4.12.14-16.149.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): kernel-source-azure-4.12.14-16.149.1, kernel-syms-azure-4.12.14-16.149.1 SUSE Linux Enterprise Server 12 SP5 (src): kernel-source-azure-4.12.14-16.149.1, kernel-syms-azure-4.12.14-16.149.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3687-1: An update that solves 13 vulnerabilities can now be installed. Category: security (important) Bug References: 1203517, 1210448, 1213272, 1213601, 1213666, 1213927, 1213969, 1213971, 1214120, 1214149, 1214348, 1214350, 1214451 CVE References: CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-21400, CVE-2023-3772, CVE-2023-3863, CVE-2023-4128, CVE-2023-4132, CVE-2023-4134, CVE-2023-4273, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459 Sources used: SUSE Linux Enterprise Live Patching 15-SP2 (src): kernel-livepatch-SLE15-SP2_Update_40-1-150200.5.3.1 SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): kernel-syms-5.3.18-150200.24.163.1, kernel-obs-build-5.3.18-150200.24.163.1, kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1, kernel-source-5.3.18-150200.24.163.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): kernel-syms-5.3.18-150200.24.163.1, kernel-obs-build-5.3.18-150200.24.163.1, kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1, kernel-source-5.3.18-150200.24.163.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): kernel-syms-5.3.18-150200.24.163.1, kernel-obs-build-5.3.18-150200.24.163.1, kernel-default-base-5.3.18-150200.24.163.1.150200.9.81.1, kernel-source-5.3.18-150200.24.163.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3705-1: An update that solves 16 vulnerabilities, contains two features and has 29 security fixes can now be installed. Category: security (important) Bug References: 1120059, 1203517, 1210327, 1210448, 1212051, 1213543, 1213546, 1213601, 1213666, 1213899, 1213904, 1213906, 1213908, 1213910, 1213911, 1213912, 1213921, 1213927, 1213969, 1213970, 1213971, 1214019, 1214149, 1214157, 1214209, 1214233, 1214299, 1214335, 1214348, 1214350, 1214451, 1214453, 1214752, 1214928, 1215028, 1215032, 1215034, 1215035, 1215036, 1215037, 1215038, 1215041, 1215046, 1215049, 1215057 CVE References: CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-34319, CVE-2023-3772, CVE-2023-3812, CVE-2023-3863, CVE-2023-40283, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4194, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459 Jira References: PED-4579, SLE-18779 Sources used: SUSE Linux Enterprise Live Patching 12-SP5 (src): kgraft-patch-SLE12-SP5_Update_48-1-8.3.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): kernel-obs-build-4.12.14-122.176.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): kernel-syms-4.12.14-122.176.1, kernel-source-4.12.14-122.176.1 SUSE Linux Enterprise Server 12 SP5 (src): kernel-syms-4.12.14-122.176.1, kernel-source-4.12.14-122.176.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): kernel-syms-4.12.14-122.176.1, kernel-source-4.12.14-122.176.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:3785-1: An update that solves 17 vulnerabilities, contains two features and has four security fixes can now be installed. Category: security (important) Bug References: 1023051, 1203517, 1210448, 1213272, 1213546, 1213601, 1213666, 1213916, 1213927, 1213968, 1213969, 1213970, 1213971, 1214019, 1214120, 1214149, 1214275, 1214297, 1214348, 1214350, 1214451 CVE References: CVE-2022-36402, CVE-2023-2007, CVE-2023-20588, CVE-2023-21400, CVE-2023-34319, CVE-2023-3772, CVE-2023-3863, CVE-2023-4128, CVE-2023-4132, CVE-2023-4133, CVE-2023-4134, CVE-2023-4147, CVE-2023-4194, CVE-2023-4273, CVE-2023-4385, CVE-2023-4387, CVE-2023-4459 Jira References: PED-4579, PED-5738 Sources used: NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. done, closing |