First published: Thu Feb 01 2024(Updated: )
A flaw in the Linux Kernel found in the Open vSwitch Kernel module. The Netlink copy code in the ovs kernel module attempts to make an in-kernel copy of the actions required. That means that when recursive operations, like sample(), clone(), dec_ttl(), etc include additional actions, the code pushes a new stack frame and recursively calls into the code block. Unfortunately, OVS module doesn't validate the stack depth, and will push too many frames causing a stack overflow which can lead to crash. Reference: <a href="https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/">https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Linux Linux kernel | <=6.7.8 | |
Linux Linux kernel | =6.8 | |
Linux Linux kernel | =6.8-rc1 | |
Linux Linux kernel | =6.8-rc2 | |
Linux Linux kernel | =6.8-rc3 | |
Linux Linux kernel | =6.8-rc4 | |
redhat/kernel | <6.8 | 6.8 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.5-1 6.12.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.