Meeting tonight.

7 views
Skip to first unread message

Rick Nemer

unread,
Jan 5, 2023, 12:10:01 PM1/5/23
to alug
Topic: Open forum tonight. 
Bring some good topics to talk about. 

Akron Linux Zoom Meeting
Time: Dinner at 6:30 at the New Era Cafe, Meeting topics about 7:30pm.
Please join us in person or on Zoom.

Join Zoom Meeting

Meeting ID: 851 0614 7802
Passcode: 990133

OldMidWest Swabbie

unread,
Jan 5, 2023, 8:36:32 PM1/5/23
to Akron Linux Users Group
Rick suggested that I post this information about the Linux Kernel Issues here : 

This just came to my attention from one of the Newsletters :  

new flaw has been discovered in the processing of SMB2_TREE_DISCONNECT commands which can lead to remote code execution in servers with ksmbd enabled. KSMBD is an in-kernel SMB file server that was mostly written by a team at Samsung Electronics that was merged into the 5.15 kernel on August 29, 2021. This kernel server implements the SMB3 protocol in kernel space for the sharing of files over a network.

According to the Zero Day Initiative, The specific flaw exists within the processing of SMB2_TREE_DISCONNECT commands. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the kernel.

This new vulnerability was discovered back in July 2022 but was only disclosed to the public on December 22, 2022. The good news is twofold: 

First, the vulnerability has been Patched, and 
second, most are still using SMB and are not affected by this vulnerability. Even so, it’s critical that you apply the patch for kernel 5.15.  Here are links to the report and the patch :  
 



=-=-=-=-=-=-=-=-=-=-=-=-=-=  

You may have missed this one : 

A new local privilege escalation vulnerability has been discovered in the Linux kernel and users are encouraged to upgrade/patch immediately.

RedHat added a new CVE code, listed as 2022-3977, which is described as a use-after-free flaw.  A use-after flaw can occur when a program attempts to use memory that has been released.

CVE 2022-3977 resides in the Linux kernel MCTP (Management Component Transport Protocol). How this vulnerability works is after a user simultaneously calls DROPTAG ioctl at the same time a socket close occurs. When this happens, the vulnerability can then be used to elevate privileges all the way up to root.

This CVE has been listed as Moderate, with a CVSS v3 base score of 7.0 and the vulnerability was found in the most recent upstream Linux kernel.

It was the Active Defense Lab of Venustech that originally reported the vulnerability, finding it came into being in v5.18.0 with the commit 63ed1aab3d40aa61aaa66819bdce9377ac7f40fa. Fortunately, with a recent commit, the vulnerability has been patched.

If you have a Linux machine running kernel 5.18, you should immediately run an upgrade to patch the kernel. Most major repositories have most likely added the patch to their standard repositories.

      < https://access.redhat.com/security/cve/CVE-2022-3977 >  



------------------------------------  

In the news: Microsoft Expands Their Windows Subsystem for Linux Offerings with AlmaLinux; Debian 11.3 Released with Numerous Bug and Security Fixes...   

I hope that this information has been found useful ! 

Reply all
Reply to author
Forward
0 new messages