Security vulnerabilities in the Linux Kernel RNDIS driver
This document (000021587) is provided subject to the disclaimer at the end of this document.
Environment
For a comprehensive list of affected products, please review the SUSE security announcements:
https://www.suse.com/security/cve/CVE-2022-25375.html
https://www.suse.com/security/cve/CVE-2022-48837.html
https://www.suse.com/security/cve/CVE-2022-48926.html
https://www.suse.com/security/cve/CVE-2023-23559.html
Situation
The Linux Kernel RNDIS driver is considered unsafe, but currently left in the tree due to a large amount of users.
It is however not recommend to use it anymore as its considered insecure.
For this reason SUSE has blacklisted the rndis module from loading the module to remove this attack surface.
Resolution
Blacklisting is achieved by these lines:
/lib/modprobe.d/50-blacklist-rndis.conf:blacklist rndis_wlan
/lib/modprobe.d/50-blacklist-rndis.conf:blacklist usb_f_rndis
/lib/modprobe.d/50-blacklist-rndis.conf:blacklist rndis_host
If the module is loaded manually by the administrator, it likely is exploitable by local users.
If one or more of the above modules should be loaded automatically again, please remove above lines or remove the
/lib/modprobe.d/50-blacklist-rndis.conf file.
Status
Disclaimer
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:000021587
- Creation Date: 18-Oct-2024
- Modified Date:18-Oct-2024
-
- SUSE Linux Enterprise Desktop
- SUSE Linux Enterprise Server
- SUSE Linux Enterprise Server for SAP Applications
- SUSE Manager Server
- SUSE Linux Enterprise Micro
- SUSE Manager Proxy
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com