CVE-2023-4194

A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

History

21 Feb 2024, 20:37

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado un fallo en la funcionalidad TUN/TAP del kernel de Linux. Este problema podría permitir a un usuario local eludir los filtros de red y obtener acceso no autorizado a algunos recursos. Los parches originales que solucionan CVE-2023-1076 son incorrectos o incompletos. El problema es que los siguientes commits upstream - a096ccca6e50 ("tun: tun_chr_open(): inicializar correctamente el uid del socket"), - 66b2c338adce ("tap: tap_open(): inicializar correctamente el uid del socket"), pasan "inode->i_uid" a sock_init_data_uid() como último parámetro y resulta que no es correcto.
CPE cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
First Time Debian
Debian debian Linux
References () https://access.redhat.com/errata/RHSA-2023:6583 - () https://access.redhat.com/errata/RHSA-2023:6583 - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - () https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20231027-0002/ - () https://security.netapp.com/advisory/ntap-20231027-0002/ - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5480 - () https://www.debian.org/security/2023/dsa-5480 - Third Party Advisory
References () https://www.debian.org/security/2023/dsa-5492 - () https://www.debian.org/security/2023/dsa-5492 - Third Party Advisory

07 Nov 2023, 14:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2023:6583 -

27 Oct 2023, 15:15

Type Values Removed Values Added
References
  • (MISC) https://security.netapp.com/advisory/ntap-20231027-0002/ -

20 Oct 2023, 00:15

Type Values Removed Values Added
References
  • (MISC) https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html -

10 Sep 2023, 12:16

Type Values Removed Values Added
References
  • (MISC) https://www.debian.org/security/2023/dsa-5492 -

19 Aug 2023, 18:17

Type Values Removed Values Added
References
  • (MISC) https://www.debian.org/security/2023/dsa-5480 -

14 Aug 2023, 18:36

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-863
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2229498 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2229498 - Issue Tracking, Third Party Advisory
References (MISC) https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/ - (MISC) https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/ - Mailing List, Patch, Vendor Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/ - Mailing List, Third Party Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/ - Mailing List, Third Party Advisory
References (MISC) https://lore.kernel.org/all/20230731164237.48365-2-lersek@redhat.com/ - (MISC) https://lore.kernel.org/all/20230731164237.48365-2-lersek@redhat.com/ - Mailing List, Patch, Vendor Advisory
References (MISC) https://access.redhat.com/security/cve/CVE-2023-4194 - (MISC) https://access.redhat.com/security/cve/CVE-2023-4194 - Third Party Advisory
References (MISC) https://lore.kernel.org/all/20230731164237.48365-1-lersek@redhat.com/ - (MISC) https://lore.kernel.org/all/20230731164237.48365-1-lersek@redhat.com/ - Mailing List, Patch, Vendor Advisory
First Time Linux
Fedoraproject fedora
Fedoraproject
Redhat enterprise Linux
Linux linux Kernel
Redhat

14 Aug 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/ -
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/ -

07 Aug 2023, 15:41

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-07 14:15

Updated : 2024-03-26 16:15


NVD link : CVE-2023-4194

Mitre link : CVE-2023-4194

CVE.ORG link : CVE-2023-4194


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux

redhat

  • enterprise_linux

fedoraproject

  • fedora
CWE
CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')

CWE-863

Incorrect Authorization