Bug 1214245 (CVE-2023-28938) - VUL-0: CVE-2023-28938: mdadm: Uncontrolled resource consumption may allow a priviledged user to potentially enable denial of service via local access
Summary: VUL-0: CVE-2023-28938: mdadm: Uncontrolled resource consumption may allow a p...
Status: RESOLVED FIXED
Alias: CVE-2023-28938
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Minor
Target Milestone: ---
Assignee: kernel-storage-team
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/375088/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-28938:3.4:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-08-14 09:40 UTC by Stoyan Manolov
Modified: 2023-10-04 03:29 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stoyan Manolov 2023-08-14 09:40:52 UTC
CVE-2023-28938

Uncontrolled resource consumption in some Intel(R) SSD Tools software before version mdadm-4.2-rc2 may allow a priviledged user to potentially enable denial of service via local access.

References:

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00690.html

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-28938
https://bugzilla.redhat.com/show_bug.cgi?id=2231427
https://www.cve.org/CVERecord?id=CVE-2023-28938
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00690.html
Comment 3 Martin Wilck 2023-08-31 11:15:33 UTC
Mariusz, can you please help clarify which patches need to be backported?
Comment 4 Mariusz Tkaczyk 2023-08-31 12:04:06 UTC
It is not done by my team but I remember this topic.

Please give me few days to clarify it.

Thanks,
Mariusz
Comment 5 Mariusz Tkaczyk 2023-09-01 07:50:40 UTC
This one is for native, but it was discovered by security team:

https://git.kernel.org/pub/scm/utils/mdadm/mdadm.git/commit/?id=7d374a1869d3a84971d027a7f4233878c8f25a62

Please note that --detail is one shoot action so the risk is minimal.
Comment 6 Martin Wilck 2023-09-01 07:59:48 UTC
So my guess was correct here, too. Thanks Mariusz.
Comment 8 Brahmajit Das 2023-09-05 06:14:28 UTC
Hi Martin.

I had a customer request fix CVE-2023-28736 and CVE-2023-28938 on SLES 12-SP5. I've done the backport, can you please approve and/or review my work. I can then go ahead with the PTF.

https://build.suse.de/project/show/PTF:26809
Comment 9 Martin Wilck 2023-09-05 07:15:45 UTC
(In reply to Brahmajit Das from comment #8)
> Hi Martin.
> 
> I had a customer request fix CVE-2023-28736 and CVE-2023-28938 on SLES
> 12-SP5. I've done the backport, can you please approve and/or review my
> work. I can then go ahead with the PTF.
> 
> https://build.suse.de/project/show/PTF:26809

The backported patches look correct.

But could you use the same patch names I used for SLE15-SP3, maybe, and refer to 1214244 and 1214245 in the changelog? That will make it easier to compare the SLE15 and SLE12 backports. Also, I'd recommend to keep the upstream patch header with the commit ID in the patch file:

https://build.suse.de/package/view_file/home:mwilck:branches:SUSE:SLE-15-SP3:Update/mdadm/1017-mdadm-block-creation-with-long-names.patch
https://build.suse.de/package/view_file/home:mwilck:branches:SUSE:SLE-15-SP3:Update/mdadm/1018-Fix-memory-leak-after-mdadm-detail.patch
Comment 10 Brahmajit Das 2023-09-05 07:16:53 UTC
Understood, changing.
Comment 11 Brahmajit Das 2023-09-05 08:15:32 UTC
Martin,

> But could you use the same patch names I used for SLE15-SP3, maybe, and refer to 1214244 and 1214245 in the changelog?

Done. Fortunately the patches from SLE15-SP3 could be applied in as-is manner. So I just checked out the files from your submission. Also made sure to mention the CVE number and CVE bug number in changelog.
Comment 12 Martin Wilck 2023-09-05 09:06:55 UTC
Perfect, thanks. Will you also submit this to the regular SLE12-SP5 code stream?
Comment 13 Brahmajit Das 2023-09-05 09:14:36 UTC
Sure, why not.
Comment 15 Maintenance Automation 2023-09-20 08:30:26 UTC
SUSE-SU-2023:3691-1: An update that solves two vulnerabilities and has one security fix can now be installed.

Category: security (moderate)
Bug References: 1214244, 1214245, 1214974
CVE References: CVE-2023-28736, CVE-2023-28938
Sources used:
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): mdadm-4.1-4.29.1
SUSE Linux Enterprise Server 12 SP5 (src): mdadm-4.1-4.29.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): mdadm-4.1-4.29.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 16 Maintenance Automation 2023-10-03 20:30:08 UTC
SUSE-SU-2023:3953-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1214244, 1214245
CVE References: CVE-2023-28736, CVE-2023-28938
Sources used:
SUSE Linux Enterprise Micro for Rancher 5.3 (src): mdadm-4.1-150300.24.33.1
SUSE Linux Enterprise Micro 5.3 (src): mdadm-4.1-150300.24.33.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): mdadm-4.1-150300.24.33.1
SUSE Linux Enterprise Micro 5.4 (src): mdadm-4.1-150300.24.33.1
Basesystem Module 15-SP4 (src): mdadm-4.1-150300.24.33.1
SUSE Manager Proxy 4.2 (src): mdadm-4.1-150300.24.33.1
SUSE Manager Retail Branch Server 4.2 (src): mdadm-4.1-150300.24.33.1
SUSE Manager Server 4.2 (src): mdadm-4.1-150300.24.33.1
SUSE Linux Enterprise Micro 5.1 (src): mdadm-4.1-150300.24.33.1
SUSE Linux Enterprise Micro 5.2 (src): mdadm-4.1-150300.24.33.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): mdadm-4.1-150300.24.33.1
openSUSE Leap 15.4 (src): mdadm-4.1-150300.24.33.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.