From ${URL} : Linux kernel built with the Universal TUN/TAP device driver(CONFIG_TUN) support is vulnerable to a potential privilege escalation via an use-after-free flaw. It could occur while doing an ioctl(TUNSETIFF) call. A privileged(CAP_NET_ADMIN) user/program could use this flaw to crash the kernel resulting DoS or potentially escalate privileges to gain root access to a system. Upstream fix: ------------- -> https://lkml.org/lkml/2013/9/11/335 Reference: ---------- -> http://www.openwall.com/lists/oss-security/2013/09/12/3
CVE-2013-4343 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4343): Use-after-free vulnerability in drivers/net/tun.c in the Linux kernel through 3.11.1 allows local users to gain privileges by leveraging the CAP_NET_ADMIN capability and providing an invalid tuntap interface name in a TUNSETIFF ioctl call.
In 3.11.5 onwards