It was found that the kernel produces unlimited number of warning messages in case certain malformed NETLINK packets are received. A local, unprivileged user could generate such packets unlimitedly and potentially flood the kernel and the system log with excessive warning messages.
This issue was discovered by Florian Weimer of Red Hat.
This problem does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 and MRG-2. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7.
This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Upstream patch submission:
Upstream patch version next submission: