CVE-2023-4194

A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.
References
Link Resource
https://access.redhat.com/errata/RHSA-2023:6583 Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-4194 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2229498 Issue Tracking Third Party Advisory
https://lore.kernel.org/all/20230731164237.48365-1-lersek@redhat.com/ Mailing List Patch Vendor Advisory
https://lore.kernel.org/all/20230731164237.48365-2-lersek@redhat.com/ Mailing List Patch Vendor Advisory
https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/ Mailing List Patch Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:6583 Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-4194 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2229498 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/
https://lore.kernel.org/all/20230731164237.48365-1-lersek@redhat.com/ Mailing List Patch Vendor Advisory
https://lore.kernel.org/all/20230731164237.48365-2-lersek@redhat.com/ Mailing List Patch Vendor Advisory
https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/ Mailing List Patch Vendor Advisory
https://security.netapp.com/advisory/ntap-20231027-0002/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.5:rc4:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-08-07 14:15

Updated : 2024-11-21 08:34


NVD link : CVE-2023-4194

Mitre link : CVE-2023-4194

CVE.ORG link : CVE-2023-4194


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux

fedoraproject

  • fedora

redhat

  • enterprise_linux
CWE
CWE-863

Incorrect Authorization

CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')