
Cloud Vulnerability DB
A community-led vulnerabilities database
An out-of-bounds memory access vulnerability (CVE-2023-3812) was discovered in the Linux kernel's TUN/TAP device driver functionality. The vulnerability affects Linux kernel versions from 4.15 up to 6.0.8, including Red Hat Enterprise Linux 8.0 and 9.0 (NVD).
The vulnerability occurs when a user generates a malicious oversized networking packet with napi frags enabled in the TUN/TAP device driver. This flaw is classified as an Out-of-bounds Write (CWE-787) and Use After Free (CWE-416) vulnerability. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access requirements with low attack complexity (NVD).
The vulnerability can allow a local user to crash the system or potentially escalate their privileges on the affected system. This poses a significant risk to system stability and security, particularly in multi-user environments (NVD).
A patch has been released to address this vulnerability and is available through various Linux distributions' security updates. Red Hat has released multiple security advisories (RHSA) to address this vulnerability across different versions of their Enterprise Linux distributions (Red Hat Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."