First published: Thu Feb 01 2024(Updated: )
A flaw in the Linux Kernel found in the Open vSwitch Kernel module. The Netlink copy code in the ovs kernel module attempts to make an in-kernel copy of the actions required. That means that when recursive operations, like sample(), clone(), dec_ttl(), etc include additional actions, the code pushes a new stack frame and recursively calls into the code block. Unfortunately, OVS module doesn't validate the stack depth, and will push too many frames causing a stack overflow which can lead to crash. Reference: <a href="https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/">https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.8 | 6.8 |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Linux Kernel | <=6.7.8 | |
Linux Kernel | =6.8 | |
Linux Kernel | =6.8-rc1 | |
Linux Kernel | =6.8-rc2 | |
Linux Kernel | =6.8-rc3 | |
Linux Kernel | =6.8-rc4 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1151 has been categorized as a significant vulnerability affecting the Linux Kernel's Open vSwitch Kernel module.
To mitigate CVE-2024-1151, update your Linux Kernel to versions 6.8 or above, or apply respective patches provided by your distribution.
CVE-2024-1151 impacts various Linux distributions including Red Hat Enterprise Linux, Debian, and Fedora.
CVE-2024-1151 could potentially be exploited remotely, depending on the specific implementation of the affected software.
Exploitation of CVE-2024-1151 could lead to unauthorized actions within the kernel, impacting system integrity and security.