Bug 1216156 (CVE-2023-37536)

Summary: VUL-0: CVE-2023-37536: xerces-c: integer overflow
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: davide.benini, martin.schreiner, rfrohl, stoyan.manolov
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/381536/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-37536:8.2:(AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2023-10-12 03:21:10 UTC
An integer overflow in xerces-c++ 3.2.3 in BigFix Platform allows remote
attackers to cause out-of-bound access via HTTP request.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-37536
Comment 1 Martin Schreiner 2023-10-13 14:00:26 UTC
Hello,

As of right now this CVE seems to still be under analysis, as can be seen on the link you provided.
But I'm actively monitoring it, and will confirm it ASAP.

Also, as soon as we have a confirmation, I'll work on patching all affected code streams.

Thank you.
Comment 3 Martin Schreiner 2023-11-17 13:51:29 UTC
Hi,

I found a patch from this issue from the 3.2.4 branch here:
https://github.com/apache/xerces-c/pull/51/files

I'll backport it into 3.2.3, expect submissions very soon.
Thanks.
Comment 4 Martin Schreiner 2023-11-18 05:40:52 UTC
The commit was cherry-picked and backported from 3.2.4.
No incompatibility was found, I just had to include an extra header.
Version 3.2.4 already has this fix, so Factory is not impacted.


Request submitted for SLE-15-SP2 (xerces-c 3.1.4):
https://build.suse.de/request/show/313087
Version 3.1.4 seems to be impacted as well, although the CVE only reports the issue for 3.2.3.
From Red Hat's security report: https://access.redhat.com/security/cve/cve-2023-37536
We can see RHEL7 is impacted, and this version of RHEL/CentOS shipped xerces-c 3.1.1: https://rpmfind.net/linux/RPM/centos/7.9.2009/x86_64/Packages/xerces-c-3.1.1-10.el7_7.x86_64.html


Request submitted for SLE-15-SP3 (xerces-c 3.2.3):
https://build.suse.de/request/show/313088
Comment 5 Martin Schreiner 2023-11-18 05:58:05 UTC
Submitted for SLE-12:Update, too, also affected (xerces-c 3.1.1):
https://build.suse.de/request/show/313089
Comment 6 Maintenance Automation 2023-11-24 12:30:30 UTC
SUSE-SU-2023:4543-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1216156
CVE References: CVE-2023-37536
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): xerces-c-3.1.1-13.9.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): xerces-c-3.1.1-13.9.1
SUSE Linux Enterprise Server 12 SP5 (src): xerces-c-3.1.1-13.9.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): xerces-c-3.1.1-13.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Maintenance Automation 2023-11-27 16:30:16 UTC
SUSE-SU-2023:4586-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1216156
CVE References: CVE-2023-37536
Sources used:
openSUSE Leap 15.3 (src): xerces-c-3.2.3-150300.3.3.2
openSUSE Leap 15.4 (src): xerces-c-3.2.3-150300.3.3.2
openSUSE Leap 15.5 (src): xerces-c-3.2.3-150300.3.3.2
Basesystem Module 15-SP4 (src): xerces-c-3.2.3-150300.3.3.2
Basesystem Module 15-SP5 (src): xerces-c-3.2.3-150300.3.3.2
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): xerces-c-3.2.3-150300.3.3.2
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): xerces-c-3.2.3-150300.3.3.2
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): xerces-c-3.2.3-150300.3.3.2
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): xerces-c-3.2.3-150300.3.3.2
SUSE Enterprise Storage 7.1 (src): xerces-c-3.2.3-150300.3.3.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-12-11 16:30:01 UTC
SUSE-SU-2023:4715-1: An update that solves one vulnerability can now be installed.

Category: security (important)
Bug References: 1216156
CVE References: CVE-2023-37536
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): xerces-c-3.1.4-150200.10.8.2
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): xerces-c-3.1.4-150200.10.8.2
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): xerces-c-3.1.4-150200.10.8.2
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): xerces-c-3.1.4-150200.10.8.2
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): xerces-c-3.1.4-150200.10.8.2
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): xerces-c-3.1.4-150200.10.8.2
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): xerces-c-3.1.4-150200.10.8.2
SUSE Enterprise Storage 7.1 (src): xerces-c-3.1.4-150200.10.8.2
openSUSE Leap 15.4 (src): xerces-c-3.1.4-150200.10.8.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Martin Schreiner 2023-12-28 16:21:17 UTC
As I've submitted a fix and it's been accepted, I'm moving this back to the security team.
Comment 10 Davide Benini 2024-03-07 12:02:34 UTC
SUSE Linux Enterprise Server 12 SP2 PTF published at https://bugzilla.suse.com/show_bug.cgi?id=1221037
Comment 11 Robert Frohl 2024-06-07 15:01:12 UTC
done, closing