Bug 1215468

Summary: VUL-0: CVE-2023-42752: kernel: integer overflow leading to exploitable memory access
Product: [Novell Products] SUSE Security Incidents Reporter: Robert Frohl <rfrohl>
Component: IncidentsAssignee: Kernel Bugs <kernel-bugs>
Status: RESOLVED DUPLICATE QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P5 - None CC: gianluca.gabrielli, security-team
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/379098/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Robert Frohl 2023-09-19 06:47:36 UTC
CVE-2023-42752

Posted by Kyle Zeng on Sep 18Hi there,

I recently found an integer overflow in the Linux kernel, which leads
to the kernel allocating `skb_shared_info` in the userspace, which is
exploitable in systems without SMAP protection since `skb_shared_info`
contains references to function pointers.

I verified the existence of the vulnerability on both the main tree
and v6.1.y, more versions may be affected (potentially all stable
trees).

[Root Cause]

The root cause of the...

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42752
https://seclists.org/oss-sec/2023/q3/192
Comment 3 Gianluca Gabrielli 2023-09-19 07:51:05 UTC
Closing this as duplicate

*** This bug has been marked as a duplicate of bug 1215146 ***