CVE-2023-4194

5.5 MEDIUM
Published: August 07, 2023 Modified: February 18, 2026
View on NVD

Description

A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode->i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://access.redhat.com/errata/RHSA-2023:6583
Source: secalert@redhat.com
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-4194
Source: secalert@redhat.com
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2229498
Source: secalert@redhat.com
Issue Tracking Third Party Advisory
https://lore.kernel.org/all/20230731164237.48365-1-lersek@redhat.com/
Source: secalert@redhat.com
Mailing List Patch Vendor Advisory
https://lore.kernel.org/all/20230731164237.48365-2-lersek@redhat.com/
Source: secalert@redhat.com
Mailing List Patch Vendor Advisory
https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/
Source: secalert@redhat.com
Mailing List Patch Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:6583
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/security/cve/CVE-2023-4194
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2229498
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://lore.kernel.org/all/20230731164237.48365-1-lersek@redhat.com/
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Vendor Advisory
https://lore.kernel.org/all/20230731164237.48365-2-lersek@redhat.com/
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Vendor Advisory
https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Vendor Advisory
https://security.netapp.com/advisory/ntap-20231027-0002/
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.debian.org/security/2023/dsa-5480
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.debian.org/security/2023/dsa-5492
Source: af854a3a-2127-422b-91ae-364da2661108

18 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.5 / 10.0
EPSS (Exploit Probability)
0.0%
0th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

fedoraproject linux debian redhat