|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-37536: xerces-c: integer overflow | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Major | ||
| Priority: | P3 - Medium | CC: | davide.benini, martin.schreiner, rfrohl, stoyan.manolov |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/381536/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-37536:8.2:(AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2023-10-12 03:21:10 UTC
Hello, As of right now this CVE seems to still be under analysis, as can be seen on the link you provided. But I'm actively monitoring it, and will confirm it ASAP. Also, as soon as we have a confirmation, I'll work on patching all affected code streams. Thank you. Hi, I found a patch from this issue from the 3.2.4 branch here: https://github.com/apache/xerces-c/pull/51/files I'll backport it into 3.2.3, expect submissions very soon. Thanks. The commit was cherry-picked and backported from 3.2.4. No incompatibility was found, I just had to include an extra header. Version 3.2.4 already has this fix, so Factory is not impacted. Request submitted for SLE-15-SP2 (xerces-c 3.1.4): https://build.suse.de/request/show/313087 Version 3.1.4 seems to be impacted as well, although the CVE only reports the issue for 3.2.3. From Red Hat's security report: https://access.redhat.com/security/cve/cve-2023-37536 We can see RHEL7 is impacted, and this version of RHEL/CentOS shipped xerces-c 3.1.1: https://rpmfind.net/linux/RPM/centos/7.9.2009/x86_64/Packages/xerces-c-3.1.1-10.el7_7.x86_64.html Request submitted for SLE-15-SP3 (xerces-c 3.2.3): https://build.suse.de/request/show/313088 Submitted for SLE-12:Update, too, also affected (xerces-c 3.1.1): https://build.suse.de/request/show/313089 SUSE-SU-2023:4543-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1216156 CVE References: CVE-2023-37536 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): xerces-c-3.1.1-13.9.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): xerces-c-3.1.1-13.9.1 SUSE Linux Enterprise Server 12 SP5 (src): xerces-c-3.1.1-13.9.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): xerces-c-3.1.1-13.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4586-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1216156 CVE References: CVE-2023-37536 Sources used: openSUSE Leap 15.3 (src): xerces-c-3.2.3-150300.3.3.2 openSUSE Leap 15.4 (src): xerces-c-3.2.3-150300.3.3.2 openSUSE Leap 15.5 (src): xerces-c-3.2.3-150300.3.3.2 Basesystem Module 15-SP4 (src): xerces-c-3.2.3-150300.3.3.2 Basesystem Module 15-SP5 (src): xerces-c-3.2.3-150300.3.3.2 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): xerces-c-3.2.3-150300.3.3.2 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): xerces-c-3.2.3-150300.3.3.2 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): xerces-c-3.2.3-150300.3.3.2 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): xerces-c-3.2.3-150300.3.3.2 SUSE Enterprise Storage 7.1 (src): xerces-c-3.2.3-150300.3.3.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4715-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1216156 CVE References: CVE-2023-37536 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): xerces-c-3.1.4-150200.10.8.2 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): xerces-c-3.1.4-150200.10.8.2 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): xerces-c-3.1.4-150200.10.8.2 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): xerces-c-3.1.4-150200.10.8.2 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): xerces-c-3.1.4-150200.10.8.2 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): xerces-c-3.1.4-150200.10.8.2 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): xerces-c-3.1.4-150200.10.8.2 SUSE Enterprise Storage 7.1 (src): xerces-c-3.1.4-150200.10.8.2 openSUSE Leap 15.4 (src): xerces-c-3.1.4-150200.10.8.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. As I've submitted a fix and it's been accepted, I'm moving this back to the security team. SUSE Linux Enterprise Server 12 SP2 PTF published at https://bugzilla.suse.com/show_bug.cgi?id=1221037 done, closing |