5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.2 Medium
AI Score
Confidence
High
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:S/C:N/I:P/A:N
0.0004 Low
EPSS
Percentile
5.4%
A flaw was found in the Linux kernel’s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (“tun: tun_chr_open(): correctly initialize socket uid”), - 66b2c338adce (“tap: tap_open(): correctly initialize socket uid”), pass “inode->i_uid” to sock_init_data_uid() as the last parameter and that turns out to not be accurate.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 10.0 | |
debian_linux | eq | 11.0 | |
debian_linux | eq | 12.0 | |
fedora | eq | 37 | |
fedora | eq | 38 | |
linux_kernel | eq | 6.5 rc1 | |
linux_kernel | eq | 6.5 rc2 | |
linux_kernel | eq | 6.5 rc3 | |
linux_kernel | eq | 6.5 rc4 | |
linux_kernel | le | 6.4 |
access.redhat.com/errata/RHSA-2023:6583
access.redhat.com/security/cve/CVE-2023-4194
bugzilla.redhat.com/show_bug.cgi?id=2229498
lists.debian.org/debian-lts-announce/2023/10/msg00027.html
lists.fedoraproject.org/archives/list/[email protected]/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/
lists.fedoraproject.org/archives/list/[email protected]/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/
lore.kernel.org/all/[email protected]/
lore.kernel.org/all/[email protected]/
lore.kernel.org/all/[email protected]/
security.netapp.com/advisory/ntap-20231027-0002/
www.debian.org/security/2023/dsa-5480
www.debian.org/security/2023/dsa-5492
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.2 Medium
AI Score
Confidence
High
1.7 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:S/C:N/I:P/A:N
0.0004 Low
EPSS
Percentile
5.4%