2023-12-30 19:00:33 +00:00
{
2024-01-02 20:00:38 +00:00
"data_version" : "4.0" ,
2023-12-30 19:00:33 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2023-7192" ,
2024-01-02 20:00:38 +00:00
"ASSIGNER" : "secalert@redhat.com" ,
"STATE" : "PUBLIC"
2023-12-30 19:00:33 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2024-01-02 20:00:38 +00:00
"value" : "A memory leak problem was found in ctnetlink_create_conntrack in net/netfilter/nf_conntrack_netlink.c in the Linux Kernel. This issue may allow a local attacker with CAP_NET_ADMIN privileges to cause a denial of service (DoS) attack due to a refcount overflow."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
2024-02-04 20:00:32 +00:00
"value" : "Missing Release of Memory after Effective Lifetime" ,
"cweId" : "CWE-401"
2024-01-02 20:00:38 +00:00
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
2024-04-25 17:00:33 +00:00
"vendor_name" : "Red Hat" ,
2024-01-02 20:00:38 +00:00
"product" : {
"product_data" : [
{
2024-04-25 17:00:33 +00:00
"product_name" : "Red Hat Enterprise Linux 8.2 Advanced Update Support" ,
2024-01-02 20:00:38 +00:00
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
2024-04-25 17:00:33 +00:00
"version" : "0:4.18.0-193.133.1.el8_2" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
2024-01-02 20:00:38 +00:00
"status" : "unaffected"
}
2024-04-25 17:00:33 +00:00
] ,
"defaultStatus" : "affected"
2024-01-02 20:00:38 +00:00
}
}
]
}
2024-04-25 17:00:33 +00:00
} ,
{
"product_name" : "Red Hat Enterprise Linux 8.2 Telecommunications Update Service" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:4.18.0-193.133.1.rt13.184.el8_2" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:4.18.0-193.133.1.el8_2" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:4.18.0-193.133.1.el8_2" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
2024-04-02 15:10:04 +00:00
{
"product_name" : "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:4.18.0-305.125.1.el8_4" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 8.4 Telecommunications Update Service" ,
"version" : {
"version_data" : [
2024-04-02 15:11:39 +00:00
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:4.18.0-305.125.1.rt7.201.el8_4" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
} ,
2024-04-02 15:10:04 +00:00
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:4.18.0-305.125.1.el8_4" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:4.18.0-305.125.1.el8_4" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
2024-04-01 20:43:12 +00:00
{
"product_name" : "Red Hat Enterprise Linux 8.6 Extended Update Support" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:4.18.0-372.95.1.el8_6" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
2024-04-02 15:11:39 +00:00
{
"product_name" : "Red Hat Enterprise Linux 8.8 Extended Update Support" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:4.18.0-477.51.1.el8_8" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
2024-04-01 20:43:12 +00:00
{
"product_name" : "Red Hat Enterprise Linux 9.0 Extended Update Support" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:5.14.0-70.93.2.el9_0" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
2024-04-02 15:04:21 +00:00
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:5.14.0-70.93.1.rt21.165.el9_0" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
2024-04-01 20:43:12 +00:00
}
]
}
} ,
2024-02-07 22:00:34 +00:00
{
"product_name" : "Red Hat Enterprise Linux 9.2 Extended Update Support" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:5.14.0-284.52.1.el9_2" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:5.14.0-284.52.1.rt14.337.el9_2" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
2024-04-01 20:43:12 +00:00
{
"product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 8" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"version" : "0:4.18.0-372.95.1.el8_6" ,
"lessThan" : "*" ,
"versionType" : "rpm" ,
"status" : "unaffected"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
} ,
2024-01-02 20:00:38 +00:00
{
"product_name" : "Red Hat Enterprise Linux 6" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "unknown"
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 7" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "unknown"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "unknown"
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 8" ,
"version" : {
"version_data" : [
{
2024-05-24 00:00:34 +00:00
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
2024-01-02 20:00:38 +00:00
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
}
]
}
} ,
{
"product_name" : "Red Hat Enterprise Linux 9" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
} ,
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"defaultStatus" : "affected"
}
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
2024-02-07 22:00:34 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:0723" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:0723"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:0725" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:0725"
} ,
2024-04-01 20:43:12 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:1188" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:1188"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:1250" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:1250"
} ,
2024-04-02 15:04:21 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:1306" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:1306"
} ,
2024-04-02 15:10:04 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:1367" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:1367"
} ,
2024-04-02 15:11:39 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:1382" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:1382"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:1404" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:1404"
} ,
2024-04-25 17:00:33 +00:00
{
"url" : "https://access.redhat.com/errata/RHSA-2024:2006" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:2006"
} ,
{
"url" : "https://access.redhat.com/errata/RHSA-2024:2008" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/errata/RHSA-2024:2008"
} ,
2024-01-02 20:00:38 +00:00
{
"url" : "https://access.redhat.com/security/cve/CVE-2023-7192" ,
"refsource" : "MISC" ,
"name" : "https://access.redhat.com/security/cve/CVE-2023-7192"
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2256279" ,
"refsource" : "MISC" ,
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=2256279"
} ,
{
"url" : "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=ac4893980bbe79ce383daf9a0885666a30fe4c83" ,
"refsource" : "MISC" ,
"name" : "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=ac4893980bbe79ce383daf9a0885666a30fe4c83"
}
]
} ,
"work_around" : [
{
"lang" : "en" ,
2024-01-25 21:00:35 +00:00
"value" : "Triggering this issue requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, you can disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" > /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.\n\nAlternatively, skip loading the affected netfilter module (i.e., nf_conntrack_netlink) onto the system until we have a fix available. This can be done by a blacklist mechanism which will ensure the driver is not loaded at boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~"
2024-01-02 20:00:38 +00:00
}
] ,
"impact" : {
"cvss" : [
{
"attackComplexity" : "LOW" ,
"attackVector" : "LOCAL" ,
"availabilityImpact" : "HIGH" ,
2024-01-30 13:00:37 +00:00
"baseScore" : 5.5 ,
2024-01-02 20:00:38 +00:00
"baseSeverity" : "MEDIUM" ,
2024-01-30 13:00:37 +00:00
"confidentialityImpact" : "NONE" ,
2024-01-02 20:00:38 +00:00
"integrityImpact" : "NONE" ,
"privilegesRequired" : "LOW" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "NONE" ,
2024-01-30 13:00:37 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" ,
2024-01-02 20:00:38 +00:00
"version" : "3.1"
2023-12-30 19:00:33 +00:00
}
]
}
}