Bug 30360 - cifs-utils new security issues CVE-2022-27239 and CVE-2022-29869
Summary: cifs-utils new security issues CVE-2022-27239 and CVE-2022-29869
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2022-05-02 14:21 CEST by David Walser
Modified: 2022-05-12 12:25 CEST (History)
5 users (show)

See Also:
Source RPM: cifs-utils-6.11-2.1.mga8.src.rpm
CVE: CVE-2022-27239, CVE-2022-29869
Status comment:


Attachments

Description David Walser 2022-05-02 14:21:26 CEST
A security issue fixed upstream in cifs-utils has been announced on April 27:
https://www.openwall.com/lists/oss-security/2022/04/27/5

The upstream commit that fixed the issue is linked in the message above.

Our compiler flags limit the impact to a crash.

Mageia 8 is also affected.
David Walser 2022-05-02 14:21:40 CEST

Status comment: (none) => Patch available from upstream
Whiteboard: (none) => MGA8TOO

Comment 1 David Walser 2022-05-02 20:01:33 CEST
openSUSE has issued an advsiory for this on April 27:
https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMGM2N6RR7GOZR7OP37QJTCTTLTTIWUN/
Comment 2 Lewis Smith 2022-05-07 20:26:03 CEST
No consistent recent maintainer visible, so have to assign this globally.

Assignee: bugsquad => pkg-bugs

Comment 3 David Walser 2022-05-07 22:08:26 CEST
Fedora has issued an advisory for this today (May 7):
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/

This issue, and another issue, are fixed upstream in 6.15.

Summary: cifs-utils new security issue CVE-2022-27239 => cifs-utils new security issues CVE-2022-27239 and CVE-2022-29869
Status comment: Patch available from upstream => Fixed upstream in 6.15

Comment 4 Nicolas Salguero 2022-05-09 14:37:14 CEST
Suggested advisory:
========================

The updated packages fix security vulnerabilities:

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges. (CVE-2022-27239)

cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file. (CVE-2022-29869)

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27239
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29869
https://www.openwall.com/lists/oss-security/2022/04/27/5
https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QMGM2N6RR7GOZR7OP37QJTCTTLTTIWUN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/QIYZ4L6SLSYJQ446VJAO2VGAESURQNSP/
========================

Updated packages in core/updates_testing:
========================
cifs-utils-6.11-2.2.mga8
cifs-utils-devel-6.11-2.2.mga8

from SRPM:
cifs-utils-6.11-2.2.mga8.src.rpm

Assignee: pkg-bugs => qa-bugs
CVE: (none) => CVE-2022-27239, CVE-2022-29869
CC: (none) => nicolas.salguero
Source RPM: cifs-utils-6.13-3.mga9.src.rpm => cifs-utils-6.11-2.1.mga8.src.rpm
Version: Cauldron => 8
Whiteboard: MGA8TOO => (none)
Status: NEW => ASSIGNED
Status comment: Fixed upstream in 6.15 => (none)

Comment 5 Herman Viaene 2022-05-10 14:41:09 CEST
MGA8-64 Plasma on Lenovo B50
No installation issues.
Ref bug 27315for testing
I have samba server on my desktop PC, so
# mount.cifs //mach1/beelden /mnt/cifstest/ -o domain=WORKGROUP -o username=herman
Password for herman@//mach1/beelden: 
# ls -als /mnt/cifstest/
totaal 1108
  0 drwxr-xr-x 2 root root      0 jan 11 15:00 ./
  4 drwxr-xr-x 8 root root   4096 mei 10 14:12 ../
  0 drwxr-xr-x 2 root root      0 jul 27  2020 accessbasis/
  0 drwxr-xr-x 2 root root      0 jul 27  2020 accessfinesses/
  0 drwxr-xr-x 2 root root      0 mrt 28 11:36 Afbeeldingen/
  0 drwxr-xr-x 2 root root      0 dec  3 15:30 fotos/
820 -rwxr-xr-x 1 root root 838418 mrt 20  2018 Huishouden*
  0 drwxr-xr-x 2 root root      0 aug 23  2021 lost+found/
  0 drwxr-xr-x 2 root root      0 jan 12  2019 RawORF/
208 -rwxr-xr-x 1 root root 209872 jan  6  2019 report.bug.xz*
  0 drwxr-xr-x 2 root root      0 nov 16  2016 rietmach2/
  0 drwxr-xr-x 2 root root      0 aug 23  2021 usbsticks/
 76 -rwxr-xr-x 1 root root  74337 feb  1  2019 Xorg.0.log*
That works OK.

CC: (none) => herman.viaene
Whiteboard: (none) => MGA8-64-OK

Comment 6 Thomas Andrews 2022-05-11 14:24:10 CEST
Validating Advisory in Comment 4.

CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Dave Hodgins 2022-05-11 23:35:56 CEST

Keywords: (none) => advisory
CC: (none) => davidwhodgins

Comment 7 Mageia Robot 2022-05-12 12:25:59 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2022-0170.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.