A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 08:49
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
|
| References | () https://access.redhat.com/errata/RHSA-2024:4823 - Issue Tracking | |
| References | () https://access.redhat.com/errata/RHSA-2024:4831 - Issue Tracking | |
| References | () https://access.redhat.com/security/cve/CVE-2024-1151 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2262241 - Issue Tracking, Third Party Advisory | |
| References | () https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/ - Patch | 
12 Nov 2024, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
05 Sep 2024, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
    
05 Sep 2024, 14:17
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-787 | |
| References | () https://access.redhat.com/errata/RHSA-2024:4823 - Issue Tracking | |
| References | () https://access.redhat.com/errata/RHSA-2024:4831 - Issue Tracking | |
| References | () https://access.redhat.com/security/cve/CVE-2024-1151 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2262241 - Issue Tracking, Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/ - Mailing List | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/ - Mailing List | |
| References | () https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/ - Patch | |
| First Time | 
        
        Redhat
         Debian Debian debian Linux Fedoraproject fedora Linux Linux linux Kernel Fedoraproject Redhat enterprise Linux  | 
|
| CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*  | 
24 Jul 2024, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
25 Jun 2024, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
22 Feb 2024, 04:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
22 Feb 2024, 03:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
|
| Summary | 
        
        
  | 
11 Feb 2024, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-02-11 15:15
Updated : 2024-11-21 08:49
NVD link : CVE-2024-1151
Mitre link : CVE-2024-1151
CVE.ORG link : CVE-2024-1151
JSON object : View
Products Affected
                fedoraproject
- fedora
 
redhat
- enterprise_linux
 
debian
- debian_linux
 
linux
- linux_kernel
 
