Bugzilla – Bug 1214245
VUL-0: CVE-2023-28938: mdadm: Uncontrolled resource consumption may allow a priviledged user to potentially enable denial of service via local access
Last modified: 2023-10-04 03:29:11 UTC
CVE-2023-28938 Uncontrolled resource consumption in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a priviledged user to potentially enable denial of service via local access. References: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00690.html References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28938 https://bugzilla.redhat.com/show_bug.cgi?id=2231427 https://www.cve.org/CVERecord?id=CVE-2023-28938 http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00690.html
Mariusz, can you please help clarify which patches need to be backported?
It is not done by my team but I remember this topic. Please give me few days to clarify it. Thanks, Mariusz
This one is for native, but it was discovered by security team: https://git.kernel.org/pub/scm/utils/mdadm/mdadm.git/commit/?id=7d374a1869d3a84971d027a7f4233878c8f25a62 Please note that --detail is one shoot action so the risk is minimal.
So my guess was correct here, too. Thanks Mariusz.
Hi Martin. I had a customer request fix CVE-2023-28736 and CVE-2023-28938 on SLES 12-SP5. I've done the backport, can you please approve and/or review my work. I can then go ahead with the PTF. https://build.suse.de/project/show/PTF:26809
(In reply to Brahmajit Das from comment #8) > Hi Martin. > > I had a customer request fix CVE-2023-28736 and CVE-2023-28938 on SLES > 12-SP5. I've done the backport, can you please approve and/or review my > work. I can then go ahead with the PTF. > > https://build.suse.de/project/show/PTF:26809 The backported patches look correct. But could you use the same patch names I used for SLE15-SP3, maybe, and refer to 1214244 and 1214245 in the changelog? That will make it easier to compare the SLE15 and SLE12 backports. Also, I'd recommend to keep the upstream patch header with the commit ID in the patch file: https://build.suse.de/package/view_file/home:mwilck:branches:SUSE:SLE-15-SP3:Update/mdadm/1017-mdadm-block-creation-with-long-names.patch https://build.suse.de/package/view_file/home:mwilck:branches:SUSE:SLE-15-SP3:Update/mdadm/1018-Fix-memory-leak-after-mdadm-detail.patch
Understood, changing.
Martin, > But could you use the same patch names I used for SLE15-SP3, maybe, and refer to 1214244 and 1214245 in the changelog? Done. Fortunately the patches from SLE15-SP3 could be applied in as-is manner. So I just checked out the files from your submission. Also made sure to mention the CVE number and CVE bug number in changelog.
Perfect, thanks. Will you also submit this to the regular SLE12-SP5 code stream?
Sure, why not.
SUSE-SU-2023:3691-1: An update that solves two vulnerabilities and has one security fix can now be installed. Category: security (moderate) Bug References: 1214244, 1214245, 1214974 CVE References: CVE-2023-28736, CVE-2023-28938 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): mdadm-4.1-4.29.1 SUSE Linux Enterprise Server 12 SP5 (src): mdadm-4.1-4.29.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): mdadm-4.1-4.29.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3953-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1214244, 1214245 CVE References: CVE-2023-28736, CVE-2023-28938 Sources used: SUSE Linux Enterprise Micro for Rancher 5.3 (src): mdadm-4.1-150300.24.33.1 SUSE Linux Enterprise Micro 5.3 (src): mdadm-4.1-150300.24.33.1 SUSE Linux Enterprise Micro for Rancher 5.4 (src): mdadm-4.1-150300.24.33.1 SUSE Linux Enterprise Micro 5.4 (src): mdadm-4.1-150300.24.33.1 Basesystem Module 15-SP4 (src): mdadm-4.1-150300.24.33.1 SUSE Manager Proxy 4.2 (src): mdadm-4.1-150300.24.33.1 SUSE Manager Retail Branch Server 4.2 (src): mdadm-4.1-150300.24.33.1 SUSE Manager Server 4.2 (src): mdadm-4.1-150300.24.33.1 SUSE Linux Enterprise Micro 5.1 (src): mdadm-4.1-150300.24.33.1 SUSE Linux Enterprise Micro 5.2 (src): mdadm-4.1-150300.24.33.1 SUSE Linux Enterprise Micro for Rancher 5.2 (src): mdadm-4.1-150300.24.33.1 openSUSE Leap 15.4 (src): mdadm-4.1-150300.24.33.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.