CVE-2023-3812
Summary
| CVE | CVE-2023-3812 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-07-24 16:15:00 UTC |
| Updated | 2024-01-30 16:15:00 UTC |
| Description | An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Red Hat |
|
access.redhat.com |
|
| Red Hat |
|
access.redhat.com |
|
| Red Hat |
|
access.redhat.com |
Third Party Advisory, VDB Entry |
| kernel/git/torvalds/linux.git - Linux kernel source tree |
MISC |
git.kernel.org |
|
| Red Hat |
|
access.redhat.com |
|
| Red Hat |
|
access.redhat.com |
|
| Red Hat |
|
access.redhat.com |
|
| Red Hat |
|
access.redhat.com |
Third Party Advisory, VDB Entry |
| RHSA-2023:7549 |
|
access.redhat.com |
Third Party Advisory, VDB Entry |
| RHSA-2023:7554 |
|
access.redhat.com |
Third Party Advisory, VDB Entry |
| Red Hat |
|
access.redhat.com |
|
| Red Hat |
|
access.redhat.com |
|
| Red Hat |
|
access.redhat.com |
|
| 2224048 – (CVE-2023-3812) CVE-2023-3812 kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags |
MISC |
bugzilla.redhat.com |
|
| Red Hat |
|
access.redhat.com |
Third Party Advisory, VDB Entry |
| cve-details |
MISC |
access.redhat.com |
|
| Red Hat |
|
access.redhat.com |
|
| Red Hat |
|
access.redhat.com |
Third Party Advisory, VDB Entry |
| Red Hat |
|
access.redhat.com |
|
| RHSA-2023:7548 |
|
access.redhat.com |
Third Party Advisory, VDB Entry |
| Red Hat |
|
access.redhat.com |
Third Party Advisory, VDB Entry |
| Red Hat |
|
access.redhat.com |
Third Party Advisory, VDB Entry |
| Red Hat |
|
access.redhat.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 161208 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-7549)
- 161318 Oracle Enterprise Linux Security Update for kernel (ELSA-2024-12094)
- 161404 Oracle Enterprise Linux Security Update for kernel (ELSA-2024-0461)
- 242340 Red Hat Update for kpatch-patch (RHSA-2023:6799)
- 242343 Red Hat Update for kernel (RHSA-2023:6813)
- 242481 Red Hat Update for kernel (RHSA-2023:7382)
- 242482 Red Hat Update for kernel-rt (RHSA-2023:7379)
- 242483 Red Hat Update for kernel-rt (RHSA-2023:7389)
- 242489 Red Hat Update for kpatch-patch (RHSA-2023:7411)
- 242497 Red Hat Update for kpatch-patch (RHSA-2023:7418)
- 242516 Red Hat Update for kernel (RHSA-2023:7549)
- 242522 Red Hat Update for kpatch-patch (RHSA-2023:7554)
- 242526 Red Hat Update for kernel-rt (RHSA-2023:7548)
- 242612 Red Hat Update for kernel security (RHSA-2023:7370)
- 242727 Red Hat Update for kpatch-patch (RHSA-2024:0340)
- 242728 Red Hat Update for kpatch-patch (RHSA-2024:0378)
- 242769 Red Hat Update for kpatch-patch (RHSA-2024:0554)
- 242785 Red Hat Update for kpatch-patch (RHSA-2024:0593)
- 242789 Red Hat Update for kernel (RHSA-2024:0575)
- 242830 Red Hat Update for kernel-rt (RHSA-2024:0563)
- 242831 Red Hat Update for kernel (RHSA-2024:0562)
- 242839 Red Hat Update for kernel (RHSA-2024:0461)
- 242855 Red Hat Update for kernel (RHSA-2024:0412)
- 378889 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX2-SA-2023:0036)
- 378892 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0114)
- 379043 Alibaba Cloud Linux Security Update for cloud-kernel (ALINUX3-SA-2023:0136)
- 754863 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3680-1)
- 754869 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3681-1)
- 754883 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3705-1)
- 754920 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) (SUSE-SU-2023:3772-1)
- 754921 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 39 for SLE 15 SP1) (SUSE-SU-2023:3768-1)
- 754923 SUSE Enterprise Linux Security Update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP4) (SUSE-SU-2023:3783-1)
- 754924 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 37 for SLE 15 SP1) (SUSE-SU-2023:3786-1)
- 754927 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 31 for SLE 15 SP2) (SUSE-SU-2023:3788-1)
- 754939 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 30 for SLE 15 SP2) (SUSE-SU-2023:3812-1)
- 754940 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 43 for SLE 15 SP1) (SUSE-SU-2023:3811-1)
- 754941 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 42 for SLE 15 SP1) (SUSE-SU-2023:3809-1)
- 754947 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 33 for SLE 15 SP2) (SUSE-SU-2023:3844-1)
- 754948 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 40 for SLE 15 SP1) (SUSE-SU-2023:3838-1)
- 754976 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 36 for SLE 15 SP2) (SUSE-SU-2023:3846-1)
- 754990 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 23 for SLE 15 SP3) (SUSE-SU-2023:3892-1)
- 754992 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 38 for SLE 15 SP2) (SUSE-SU-2023:3889-1)
- 754993 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 32 for SLE 15 SP2) (SUSE-SU-2023:3893-1)
- 755006 SUSE Enterprise Linux Security Update for the Linux Kernel (Live Patch 26 for SLE 15 SP3) (SUSE-SU-2023:3928-1)
- 941482 AlmaLinux Security Update for kernel (ALSA-2023:7549)
- 961087 Rocky Linux Security Update for kernel-rt (RLSA-2023:7548)
- 961089 Rocky Linux Security Update for kernel (RLSA-2023:7549)