A memory leak flaw was found in nft_set_catchall_flush in net/netfilter/nf_tables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak.
Workaround:
The product makes resources available to untrusted parties when those resources are only intended to be accessed by the product.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2023-4569 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2235470 | patch third party advisory issue tracking |
https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230812110526.49808-1-fw@strlen.de/ | patch mailing list |
https://www.debian.org/security/2023/dsa-5492 | third party advisory |