An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Fixes

Solution

No solution given by the vendor.


Workaround

To mitigate this issue, prevent the tun module from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.

History

Wed, 05 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-09-26T02:49:11.585Z

Reserved: 2023-07-20T13:02:44.826Z

Link: CVE-2023-3812

cve-icon Vulnrichment

Updated: 2024-08-02T07:08:50.501Z

cve-icon NVD

Status : Modified

Published: 2023-07-24T16:15:13.337

Modified: 2024-11-21T08:18:07.500

Link: CVE-2023-3812

cve-icon Redhat

Severity : Important

Publid Date: 2022-10-22T00:00:00Z

Links: CVE-2023-3812 - Bugzilla

cve-icon OpenCVE Enrichment

No data.