icon

We found results for “

CVE-2023-4194

Good to know:

icon

Date: August 7, 2023

A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.

Language: C

Severity Score

Severity Score

Weakness Type (CWE)

Access of Resource Using Incompatible Type ('Type Confusion')

CWE-843

Incorrect Authorization

CWE-863

Top Fix

icon

Upgrade Version

Upgrade to version v6.4.10,v6.5-rc5

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): HIGH

Do you need more information?

Contact Us