Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-3812

Опубликовано: 22 окт. 2022
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Меры по смягчению последствий

To mitigate this issue, prevent the tun module from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2023:754828.11.2023
Red Hat Enterprise Linux 8kernelFixedRHSA-2023:754928.11.2023
Red Hat Enterprise Linux 8kpatch-patchFixedRHSA-2023:755428.11.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutionskpatch-patchFixedRHSA-2023:679908.11.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionskernelFixedRHSA-2023:681308.11.2023
Red Hat Enterprise Linux 8.2 Advanced Update SupportkernelFixedRHSA-2024:200623.04.2024

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2224048kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags

EPSS

Процентиль: 0%
0.00008
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 2 лет назад

An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVSS3: 7.8
nvd
около 2 лет назад

An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.

CVSS3: 7.8
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 7.8
debian
около 2 лет назад

An out-of-bounds memory access flaw was found in the Linux kernel\u201 ...

CVSS3: 7.8
github
около 2 лет назад

An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.

EPSS

Процентиль: 0%
0.00008
Низкий

7.8 High

CVSS3