Bug 2270080 (CVE-2023-52610) - CVE-2023-52610 kernel: net/sched: act_ct: fix skb leak and crash on ooo frags
Summary: CVE-2023-52610 kernel: net/sched: act_ct: fix skb leak and crash on ooo frags
Keywords:
Status: NEW
Alias: CVE-2023-52610
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2270081
Blocks: 2270105
TreeView+ depends on / blocked
 
Reported: 2024-03-18 13:07 UTC by Zack Miele
Modified: 2024-05-01 01:22 UTC (History)
51 users (show)

Fixed In Version: kernel 5.15.148, kernel 6.1.75, kernel 6.6.14, kernel 6.7.2, kernel 6.8
Doc Type: If docs needed, set a value
Doc Text:
A memory leak flaw and potential kernel crash were found in the Linux kernel’s Conntrack module. This issue occurs when Conntrack is being used by a local user for a specific configuration, and both fragmented packets are received remotely and out of order. This flaw allows a local or remote user to crash or potentially escalate their privileges on the system.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2024:2634 0 None None None 2024-05-01 01:22:51 UTC
Red Hat Product Errata RHSA-2024:2394 0 None None None 2024-04-30 10:16:46 UTC

Description Zack Miele 2024-03-18 13:07:46 UTC
In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_ct: fix skb leak and crash on ooo frags

The Linux kernel CVE team has assigned CVE-2023-52610 to this issue.

Upstream advisory:
https://lore.kernel.org/linux-cve-announce/20240318100758.2828621-10-lee@kernel.org/T

Comment 1 Zack Miele 2024-03-18 13:08:20 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2270081]

Comment 6 Justin M. Forbes 2024-03-26 16:08:40 UTC
This was fixed for Fedora with the 6.6.14 stable kernel updates.

Comment 12 errata-xmlrpc 2024-04-30 10:16:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:2394 https://access.redhat.com/errata/RHSA-2024:2394


Note You need to log in before you can comment on or make changes to this bug.