CVE-2023-1076

Updated: 2025-02-26 21:07:33.50442

Description:

A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Released CLSA-2025:1743193221 2024-06-24 11:28:27
CentOS 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2023-10-27 11:06:49
CentOS 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2023-10-27 11:06:49
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2023-10-27 11:06:46
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2023-10-27 11:06:46
CentOS Stream 8 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-06-24 11:20:05
CloudLinux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2023-10-27 11:06:49
CloudLinux 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-10-03 10:52:00
Oracle Linux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2023-10-27 11:06:49
Ubuntu 16.04 ELS linux-hwe 4.15.0 5.5 MEDIUM Released CLSA-2023:1701279154 2023-11-29 13:12:34
Total: 12