SB2025032787 - Memory leak in Linux kernel openvswitch
Published: March 27, 2025 Updated: May 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory leak (CVE-ID: CVE-2023-52977)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the ovs_flow_cmd_new() and kfree_skb() functions in net/openvswitch/datapath.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/0c598aed445eb45b0ee7ba405f7ece99ee349c30
- https://git.kernel.org/stable/c/1ac653cf886cdfc082708c82dc6ac6115cebd2ee
- https://git.kernel.org/stable/c/70154489f531587996f3e9d7cceeee65cff0001d
- https://git.kernel.org/stable/c/70d40674a549d498bd63d5432acf46205da1534b
- https://git.kernel.org/stable/c/af4e720bc00a2653f7b9df21755b9978b3d7f386
- https://git.kernel.org/stable/c/ed6c5e8caf55778500202775167e8ccdb1a030cb
- https://git.kernel.org/stable/c/f423c2efd51d7eb1d143c2be7eea233241d9bbbf
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.93