CVE-2023-3812

An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.
References
Link Resource
https://access.redhat.com/errata/RHSA-2023:6799 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2023:6813 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2023:7370 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2023:7379 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2023:7382 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2023:7389 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2023:7411 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2023:7418 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2023:7548 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2023:7549 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2023:7554 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2024:0340
https://access.redhat.com/errata/RHSA-2024:0378
https://access.redhat.com/errata/RHSA-2024:0412
https://access.redhat.com/errata/RHSA-2024:0461
https://access.redhat.com/errata/RHSA-2024:0554
https://access.redhat.com/errata/RHSA-2024:0562
https://access.redhat.com/errata/RHSA-2024:0563
https://access.redhat.com/errata/RHSA-2024:0575
https://access.redhat.com/errata/RHSA-2024:0593
https://access.redhat.com/errata/RHSA-2024:1961
https://access.redhat.com/errata/RHSA-2024:2006
https://access.redhat.com/errata/RHSA-2024:2008
https://access.redhat.com/security/cve/CVE-2023-3812 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2224048 Issue Tracking Patch Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0 Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-07-24 16:15

Updated : 2024-04-25 13:15


NVD link : CVE-2023-3812

Mitre link : CVE-2023-3812

CVE.ORG link : CVE-2023-3812


JSON object : View

Products Affected

redhat

  • enterprise_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free

CWE-787

Out-of-bounds Write