CWE
401 416
EPSS
0.042%
Advisory Published
CVE Published
Updated

CVE-2023-7192: Kernel: refcount leak in ctnetlink_create_conntrack()

First published: Sat Dec 30 2023(Updated: )

A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. In this flaw a local attacker with CAP_NET_ADMIN privilege may cause a denial of service (DoS) attack due to a refcount overflows. Refer: <a href="https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=ac4893980bbe79ce383daf9a0885666a30fe4c83">https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=ac4893980bbe79ce383daf9a0885666a30fe4c83</a>

Credit: secalert@redhat.com secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
redhat/Kernel<6.3
6.3
Linux kernel<6.3
Red Hat Enterprise Linux=8.0
Red Hat Enterprise Linux=9.0
IBM Security QRadar<=7.5 - 7.5.0 UP8 IF01
debian/linux
5.10.223-1
5.10.234-1
6.1.129-1
6.1.133-1
6.12.21-1
6.12.22-1

Remedy

If not needed, disable the ability for unprivileged users to create namespaces. To do this temporarily, do: sudo sysctl -w kernel.unprivileged_userns_clone=0 To disable across reboots, do: echo kernel.unprivileged_userns_clone=0 | \ sudo tee /etc/sysctl.d/99-disable-unpriv-userns.conf

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2023-7192?

    CVE-2023-7192 is categorized as a high severity vulnerability due to its potential to cause denial of service attacks.

  • How do I fix CVE-2023-7192?

    To address CVE-2023-7192, update your Linux Kernel to version 6.3 or later, or apply the relevant patches provided by your operating system vendor.

  • Which versions are affected by CVE-2023-7192?

    CVE-2023-7192 affects various versions of the Linux Kernel prior to 6.3, as well as specific versions of the Red Hat Enterprise Linux and IBM QRadar SIEM products.

  • What does CVE-2023-7192 exploit?

    CVE-2023-7192 exploits a memory leak in the ctnetlink_create_conntrack function within the Linux Kernel, leading to potential denial of service.

  • Who can be impacted by CVE-2023-7192?

    Local attackers with CAP_NET_ADMIN privileges can exploit CVE-2023-7192 to launch denial of service attacks on the affected systems.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203