Back to bug 2224048
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Alex | 2023-07-19 16:58:20 UTC | Depends On | 2224054 | |
| Alex | 2023-07-20 10:26:30 UTC | CC | dfreiber, jburrell, jpoimboe, kpatch-maint, rhandlin, rogbas, vkumar | |
| Alex | 2023-07-20 10:34:28 UTC | Depends On | 2224276, 2224281, 2224273, 2224279, 2224288, 2224286, 2224271, 2224280, 2224285, 2224277, 2224272, 2224284, 2224282, 2224278, 2224270, 2224283, 2224287, 2224275 | |
| Alex | 2023-07-20 11:02:20 UTC | Depends On | 2224295, 2224292, 2224290, 2224293, 2224294, 2224296, 2224291 | |
| Alex | 2023-07-20 11:19:21 UTC | Doc Text | A flaw out of bounds memory access in the Linux kernel TUN/TAP device driver functionality was found in the way user generates malicious (too big) networking packet when napi frags enabled. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. | |
| Alex | 2023-07-20 13:01:39 UTC | Fixed In Version | kernel 6.1-rc4 | |
| Alex | 2023-07-20 13:03:08 UTC | Summary | kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags | CVE-2023-3812 kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags |
| Alias | CVE-2023-3812 | |||
| RaTasha Tillery-Smith | 2023-07-20 13:47:11 UTC | Doc Text | A flaw out of bounds memory access in the Linux kernel TUN/TAP device driver functionality was found in the way user generates malicious (too big) networking packet when napi frags enabled. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. | An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system. |
Back to bug 2224048