We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-1151

Kernel: stack overflow problem in open vswitch kernel module leading to dos



Assignerredhat
Reserved2024-02-01
Published2024-02-11
Updated2024-09-05

Description

A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.



MEDIUM: 5.5CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Problem types

Stack-based Buffer Overflow

Product status

Default status
0x4003c98040

0:5.14.0-284.75.1.el9_2 before *
unaffected

Default status
0x4003c980c0

0:5.14.0-284.75.1.rt14.360.el9_2 before *
unaffected

Default status
0x4003c98140

Default status
0x4003c981a0

Default status
0x4003c98200

Default status
0x4003c98260

Default status
0x4003c982c0

Default status
0x4003c98320

Default status
0x4003c98380

Timeline

2024-02-01:Reported to Red Hat.
2024-02-07:Made public.

Credits

This issue was discovered by Aaron Conole (Red Hat).

References

https://access.redhat.com/errata/RHSA-2024:4823 (RHSA-2024:4823) vendor-advisory

https://access.redhat.com/errata/RHSA-2024:4831 (RHSA-2024:4831) vendor-advisory

https://access.redhat.com/security/cve/CVE-2024-1151 vdb-entry

https://bugzilla.redhat.com/show_bug.cgi?id=2262241 (RHBZ#2262241) issue-tracking

https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/

cve.org CVE-2024-1151

nvd.nist.gov CVE-2024-1151

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-1151
Subscribe to our newsletter to learn more about our work.