A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 08:49
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/errata/RHSA-2024:4823 - Issue Tracking | |
References | () https://access.redhat.com/errata/RHSA-2024:4831 - Issue Tracking | |
References | () https://access.redhat.com/security/cve/CVE-2024-1151 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2262241 - Issue Tracking, Third Party Advisory | |
References | () https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/ - Patch |
12 Nov 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Sep 2024, 14:17
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* |
|
CWE | CWE-787 | |
First Time |
Debian debian Linux
Fedoraproject fedora Linux linux Kernel Debian Redhat Linux Redhat enterprise Linux Fedoraproject |
|
References | () https://access.redhat.com/errata/RHSA-2024:4823 - Issue Tracking | |
References | () https://access.redhat.com/errata/RHSA-2024:4831 - Issue Tracking | |
References | () https://access.redhat.com/security/cve/CVE-2024-1151 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2262241 - Issue Tracking, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/ - Mailing List | |
References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/ - Mailing List | |
References | () https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/ - Patch |
24 Jul 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Feb 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Feb 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-11 15:15
Updated : 2024-11-21 08:49
NVD link : CVE-2024-1151
Mitre link : CVE-2024-1151
CVE.ORG link : CVE-2024-1151
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
redhat
- enterprise_linux
fedoraproject
- fedora