A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow.
Workaround:
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:0723 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:0725 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1188 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1250 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1306 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1367 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1382 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:1404 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:2006 | vendor advisory |
https://access.redhat.com/errata/RHSA-2024:2008 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2023-7192 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2256279 | patch issue tracking |
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=ac4893980bbe79ce383daf9a0885666a30fe4c83 | patch mailing list |