« List of all CVEs

CVE-2023-4194

Kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid

Published: 8/7/2023 Last updated: 11/21/2024 Reserved: 8/6/2023

A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.

CNA assigner: redhat (53f830b8-0a3f-465b-8143-3b8a9948e749) Requested by: n/a

Metrics

Version Score Severity Vector String
3.1 5.5 Medium CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Opam packages affected (27)

albatross cdrom conf-bpftool conf-libbpf conf-linux-libc-dev core core_unix hvsock mirage-block-unix mm ocaml-probes orun rawlink rawlink-eio rawlink-lwt shell solo5 solo5-bindings-hvt solo5-bindings-spt solo5-cross-aarch64 solo5-kernel-ukvm tracy-client tuntap uring vhd-format vhd-format-lwt xapi-stdext-unix

Products affected (9)

Product Vendor Version
Red Hat Enterprise Linux 8 Red Hat < 19.2R1-S4, 19.2R2
Red Hat Enterprise Linux 9 Red Hat < https://aka.ms/OfficeSecurityReleases
Red Hat Enterprise Linux 6 Red Hat < 18.3R2-S4, 18.3R3
Red Hat Enterprise Linux 7 Red Hat 6.0.5
Red Hat Enterprise Linux 9 Red Hat 1.0
Red Hat Enterprise Linux 7 Red Hat < 19.1R2
Red Hat Enterprise Linux 8 Red Hat <= 3.3.1
Red Hat Enterprise Linux 9 Red Hat n/a
Red Hat Virtualization 4 Red Hat <= 0.0.3

References (18)

Credits (1)