Bug 1197216 (CVE-2022-27239) - VUL-0: CVE-2022-27239: cifs-utils: buffer overflow in commandline ip= handling
Summary: VUL-0: CVE-2022-27239: cifs-utils: buffer overflow in commandline ip= handling
Status: RESOLVED FIXED
Alias: CVE-2022-27239
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/326531/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-27239:6.7:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2022-03-17 10:23 UTC by David Disseldorp
Modified: 2024-05-13 19:16 UTC (History)
9 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
proposed fix from bug reporter (10.71 KB, text/plain)
2022-03-17 15:07 UTC, David Disseldorp
Details
proposed fix, properly encoded (1.46 KB, text/plain)
2022-03-17 15:08 UTC, David Disseldorp
Details
proposed fix (1.21 KB, text/plain)
2022-04-14 12:15 UTC, David Disseldorp
Details

Note You need to log in before you can comment on or make changes to this bug.
Comment 7 David Disseldorp 2022-03-17 15:07:03 UTC
Created attachment 857140 [details]
proposed fix from bug reporter

This hasn't gone full review yet, but looks good to me.
Comment 8 David Disseldorp 2022-03-17 15:08:52 UTC
Created attachment 857141 [details]
proposed fix, properly encoded
Comment 11 Marcus Meissner 2022-03-18 08:30:07 UTC
Mitre assigned CVE-2022-27239.

How about Tuesday March 29th as embargo end, which is in 12 days?
Comment 12 David Disseldorp 2022-03-18 10:37:26 UTC
(In reply to Marcus Meissner from comment #11)
> Mitre assigned CVE-2022-27239.

Thanks!

> How about Tuesday March 29th as embargo end, which is in 12 days?

Waiting to hear from upstream (MS, RH, et al.) about this proposal.
Comment 13 David Disseldorp 2022-03-18 16:54:07 UTC
RH would prefer a bit more time. I proposed 4PM UTC on April 20.

On Fri, 18 Mar 2022 17:41:54 +0100, David Disseldorp wrote:

> On Fri, 18 Mar 2022 14:27:36 +0200, Alexander Bokovoy wrote:
> 
> > On pe, 18 maalis 2022, David Disseldorp via samba-team wrote:  
> > > Hi,
> > > 
> > > I heard back from our security team regarding the CVE:
> > > 
> > >   --- Comment #11 from Marcus Meissner <meissner@suse.com> ---
> > >   Mitre assigned CVE-2022-27239.
> > >   
> > >   How about Tuesday March 29th as embargo end, which is in 12 days?
> > > 
> > > Does this embargo end date work for everyone (RH and other distros)?    
> > 
> > It will not work for Red Hat, sorry. It is too close for any meaningful
> > fix verification to be done in under one work week for backports to
> > several releases.
> > 
> > It would be great to have it scheduled for mit April, for example.  
> 
> Alright, in that case let's plan for 4PM UTC on April 20 (after the
> Easter break in some places).
Comment 14 Marcus Meissner 2022-03-18 16:57:28 UTC
CRD: 2022-04-20 16:00UTC

Ok for me.
Comment 18 David Disseldorp 2022-04-14 12:15:08 UTC
Created attachment 858158 [details]
proposed fix

The planned embargo end date is just under a week off. @Paulo: would you be able to prepare the internal build service submissions in the lead up? Please clearly label any ibs submit-requests as EMBARGOED until 2022-04-20 16:00UTC.
Comment 19 Paulo Alcantara 2022-04-14 12:45:57 UTC
(In reply to David Disseldorp from comment #18)
> Created attachment 858158 [details]
> proposed fix
> 
> The planned embargo end date is just under a week off. @Paulo: would you be
> able to prepare the internal build service submissions in the lead up?
> Please clearly label any ibs submit-requests as EMBARGOED until 2022-04-20
> 16:00UTC.

Sure.  I'll work on that.  Thanks Dave!
Comment 26 Marcus Meissner 2022-04-25 12:49:25 UTC
any news?

we so far did not publish, I think we would prefer if you open the samba bugzilla entry first.
Comment 30 Marcus Meissner 2022-04-27 07:41:54 UTC
is public via https://github.com/piastry/cifs-utils/pull/7
Comment 31 Swamp Workflow Management 2022-04-27 13:21:12 UTC
SUSE-SU-2022:1428-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1197216
CVE References: CVE-2022-27239
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 8 (src):    cifs-utils-6.9-9.18.1
SUSE OpenStack Cloud 8 (src):    cifs-utils-6.9-9.18.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    cifs-utils-6.9-9.18.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    cifs-utils-6.9-9.18.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    cifs-utils-6.9-9.18.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    cifs-utils-6.9-9.18.1
HPE Helion Openstack 8 (src):    cifs-utils-6.9-9.18.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 32 Swamp Workflow Management 2022-04-27 13:22:09 UTC
SUSE-SU-2022:1430-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1197216
CVE References: CVE-2022-27239
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    cifs-utils-6.9-150100.5.15.1
SUSE Manager Server 4.1 (src):    cifs-utils-6.9-150100.5.15.1
SUSE Manager Retail Branch Server 4.1 (src):    cifs-utils-6.9-150100.5.15.1
SUSE Manager Proxy 4.1 (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise Server for SAP 15-SP2 (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise Server 15-SP2-LTSS (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise Server 15-SP2-BCL (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise Realtime Extension 15-SP2 (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise Micro 5.2 (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    cifs-utils-6.9-150100.5.15.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    cifs-utils-6.9-150100.5.15.1
SUSE Enterprise Storage 7 (src):    cifs-utils-6.9-150100.5.15.1
SUSE Enterprise Storage 6 (src):    cifs-utils-6.9-150100.5.15.1
SUSE CaaS Platform 4.0 (src):    cifs-utils-6.9-150100.5.15.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 33 Swamp Workflow Management 2022-04-27 13:22:47 UTC
SUSE-SU-2022:1427-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1197216
CVE References: CVE-2022-27239
JIRA References: 
Sources used:
SUSE Linux Enterprise Server for SAP 15 (src):    cifs-utils-6.9-150000.3.17.1
SUSE Linux Enterprise Server 15-LTSS (src):    cifs-utils-6.9-150000.3.17.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    cifs-utils-6.9-150000.3.17.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    cifs-utils-6.9-150000.3.17.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 34 Swamp Workflow Management 2022-04-27 13:23:28 UTC
SUSE-SU-2022:14951-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1197216
CVE References: CVE-2022-27239
JIRA References: 
Sources used:
SUSE Linux Enterprise Server 11-SP4-LTSS (src):    cifs-utils-5.1-0.16.3.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src):    cifs-utils-5.1-0.16.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 35 Swamp Workflow Management 2022-04-27 13:29:03 UTC
SUSE-SU-2022:14950-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1197216
CVE References: CVE-2022-27239
JIRA References: 
Sources used:
SUSE Linux Enterprise Point of Sale 11-SP3 (src):    cifs-utils-5.1-0.14.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 36 Swamp Workflow Management 2022-04-27 13:29:47 UTC
SUSE-SU-2022:1429-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1197216
CVE References: CVE-2022-27239
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    cifs-utils-6.9-13.20.1
SUSE OpenStack Cloud 9 (src):    cifs-utils-6.9-13.20.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    cifs-utils-6.9-13.20.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    cifs-utils-6.9-13.20.1
SUSE Linux Enterprise Server 12-SP5 (src):    cifs-utils-6.9-13.20.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    cifs-utils-6.9-13.20.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 38 Swamp Workflow Management 2022-07-13 13:16:39 UTC
SUSE-SU-2022:2378-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1197216
CVE References: CVE-2022-27239
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    cifs-utils-6.15-150400.3.6.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    cifs-utils-6.15-150400.3.6.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.