Memory leak in icmp6 implementation in Linux Kernel 5.13+ allows a remote attacker to DoS a host by making it go out-of-memory via icmp6 packets of type 130 or 131. We recommend upgrading past commit 2d3916f3189172d5c69d33065c3c21119fe539fc.
Weaknesses in this category are related to improper assignment or handling of permissions.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://www.openwall.com/lists/oss-security/2022/03/15/3 | third party advisory mailing list |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2d3916f3189172d5c69d33065c3c21119fe539fc | patch vendor advisory |
https://security.netapp.com/advisory/ntap-20220425-0001/ | third party advisory |