A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2173430 | issue tracking third party advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f | mailing list patch |
https://www.openwall.com/lists/oss-security/2023/01/23/1 | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html | mailing list |
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html | mailing list |
http://www.openwall.com/lists/oss-security/2023/11/05/4 | mailing list |