CVE-2023-4194
Summary
| CVE | CVE-2023-4194 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-08-07 14:15:00 UTC |
| Updated | 2024-03-26 16:15:00 UTC |
| Description | A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [PATCH 2/2] net: tap_open(): set sk_uid from current_fsuid() - Laszlo Ersek |
MISC |
lore.kernel.org |
|
| [SECURITY] [DLA 3623-1] linux-5.10 security update |
MISC |
lists.debian.org |
|
| Debian -- Security Information -- DSA-5480-1 linux |
MISC |
www.debian.org |
|
| Red Hat |
|
access.redhat.com |
|
| [SECURITY] Fedora 37 Update: kernel-6.4.10-100.fc37 - package-announce - Fedora Mailing-Lists |
MISC |
lists.fedoraproject.org |
|
| [PATCH 1/2] net: tun_chr_open(): set sk_uid from current_fsuid() - Laszlo Ersek |
MISC |
lore.kernel.org |
|
| Debian -- Security Information -- DSA-5492-1 linux |
MISC |
www.debian.org |
|
| cve-details |
MISC |
access.redhat.com |
|
| [SECURITY] Fedora 38 Update: kernel-6.4.10-200.fc38 - package-announce - Fedora Mailing-Lists |
MISC |
lists.fedoraproject.org |
|
| 2229498 – (CVE-2023-4194) CVE-2023-4194 kernel: tap: tap_open(): correctly initialize socket uid next fix of i_uid to current_fsuid |
MISC |
bugzilla.redhat.com |
|
| August 2023 Linux Kernel 6.5-rc5 Vulnerabilities in NetApp Products | NetApp Product Security |
MISC |
security.netapp.com |
|
| [PATCH 0/2] tun/tap: set sk_uid from current_fsuid() - Laszlo Ersek |
MISC |
lore.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 161066 Oracle Enterprise Linux Security Update for kernel (ELSA-2023-6583)
- 199764 Ubuntu Security Notification for Linux kernel (OEM) Vulnerabilities (USN-6385-1)
- 199804 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6417-1)
- 199809 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6416-1)
- 199810 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6412-1)
- 199814 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-6416-2)
- 199840 Ubuntu Security Notification for Linux kernel (Raspberry Pi) Vulnerabilities (USN-6416-3)
- 199844 Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-6445-1)
- 199858 Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-6445-2)
- 199883 Ubuntu Security Notification for Linux kernel (NVIDIA) Vulnerabilities (USN-6466-1)
- 242399 Red Hat Update for kernel security (RHSA-2023:6583)
- 284396 Fedora Security Update for kernel (FEDORA-2023-d9509be489)
- 284399 Fedora Security Update for kernel (FEDORA-2023-ee241dcf80)
- 355864 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2023-051
- 356578 Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2023-054
- 6000212 Debian Security Update for linux (DSA 5480-1)
- 6000220 Debian Security Update for linux (DSA 5492-1)
- 6000265 Debian Security Update for linux-5.10 (DLA 3623-1)
- 673406 EulerOS Security Update for kernel (EulerOS-SA-2023-3182)
- 673449 EulerOS Security Update for kernel (EulerOS-SA-2023-2898)
- 673484 EulerOS Security Update for kernel (EulerOS-SA-2023-3033)
- 673498 EulerOS Security Update for kernel (EulerOS-SA-2023-3132)
- 673732 EulerOS Security Update for kernel (EulerOS-SA-2023-3010)
- 673848 EulerOS Security Update for kernel (EulerOS-SA-2023-3217)
- 673970 EulerOS Security Update for kernel (EulerOS-SA-2023-2879)
- 754832 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3600-1)
- 754833 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3599-1)
- 754855 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3656-1)
- 754866 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3684-1)
- 754867 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3683-1)
- 754868 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3682-1)
- 754869 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3681-1)
- 754883 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3705-1)
- 754884 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3704-1)
- 754899 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3599-2)
- 754900 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3600-2)
- 754901 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3704-2)
- 754903 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3683-2)
- 755026 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3964-1)
- 755037 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3971-1)
- 755038 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3969-1)
- 755043 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3988-1)