Количество 30
Количество 30

CVE-2023-4194
A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.

CVE-2023-4194
A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.

CVE-2023-4194
A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.

CVE-2023-4194
CVE-2023-4194
A flaw was found in the Linux kernel's TUN/TAP functionality. This iss ...
GHSA-9cmp-2g73-ff98
A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.

BDU:2023-04659
Уязвимость функции tap_open() в модуле drivers/net/tap.c драйвере TUN/TAP ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных или повысить свои привилегии

SUSE-SU-2023:3392-1
Security update for the Linux Kernel

SUSE-SU-2023:3969-1
Security update for the Linux Kernel

SUSE-SU-2023:3964-1
Security update for the Linux Kernel

SUSE-SU-2023:3705-1
Security update for the Linux Kernel

SUSE-SU-2023:3683-2
Security update for the Linux Kernel

SUSE-SU-2023:3683-1
Security update for the Linux Kernel

SUSE-SU-2023:3682-1
Security update for the Linux Kernel

SUSE-SU-2023:3681-1
Security update for the Linux Kernel

SUSE-SU-2023:3601-1
Security update for the Linux Kernel

SUSE-SU-2023:3600-2
Security update for the Linux Kernel

SUSE-SU-2023:3600-1
Security update for the Linux Kernel

SUSE-SU-2023:3390-1
Security update for the Linux Kernel

SUSE-SU-2023:3684-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-4194 A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate. | CVSS3: 5.5 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4194 A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate. | CVSS3: 5.5 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4194 A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate. | CVSS3: 5.5 | 0% Низкий | почти 2 года назад |
![]() | CVSS3: 5.5 | 0% Низкий | почти 2 года назад | |
CVE-2023-4194 A flaw was found in the Linux kernel's TUN/TAP functionality. This iss ... | CVSS3: 5.5 | 0% Низкий | почти 2 года назад | |
GHSA-9cmp-2g73-ff98 A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate. | CVSS3: 5.5 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-04659 Уязвимость функции tap_open() в модуле drivers/net/tap.c драйвере TUN/TAP ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность данных или повысить свои привилегии | CVSS3: 5.5 | 0% Низкий | почти 2 года назад |
![]() | SUSE-SU-2023:3392-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:3969-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:3964-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:3705-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:3683-2 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:3683-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:3682-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:3681-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:3601-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:3600-2 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:3600-1 Security update for the Linux Kernel | больше 1 года назад | ||
![]() | SUSE-SU-2023:3390-1 Security update for the Linux Kernel | почти 2 года назад | ||
![]() | SUSE-SU-2023:3684-1 Security update for the Linux Kernel | почти 2 года назад |
Уязвимостей на страницу