Back to bug 2224048

Who When What Removed Added
Alex 2023-07-19 16:58:20 UTC Depends On 2224054
Alex 2023-07-20 10:26:30 UTC CC dfreiber, jburrell, jpoimboe, kpatch-maint, rhandlin, rogbas, vkumar
Alex 2023-07-20 10:34:28 UTC Depends On 2224276, 2224281, 2224273, 2224279, 2224288, 2224286, 2224271, 2224280, 2224285, 2224277, 2224272, 2224284, 2224282, 2224278, 2224270, 2224283, 2224287, 2224275
Alex 2023-07-20 11:02:20 UTC Depends On 2224295, 2224292, 2224290, 2224293, 2224294, 2224296, 2224291
Alex 2023-07-20 11:19:21 UTC Doc Text A flaw out of bounds memory access in the Linux kernel TUN/TAP device driver functionality was found in the way user generates malicious (too big) networking packet when napi frags enabled. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
Alex 2023-07-20 13:01:39 UTC Fixed In Version kernel 6.1-rc4
Alex 2023-07-20 13:03:08 UTC Summary kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags CVE-2023-3812 kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags
Alias CVE-2023-3812
RaTasha Tillery-Smith 2023-07-20 13:47:11 UTC Doc Text A flaw out of bounds memory access in the Linux kernel TUN/TAP device driver functionality was found in the way user generates malicious (too big) networking packet when napi frags enabled. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Back to bug 2224048