A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.
Workaround:
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:4823 | vendor advisory issue tracking |
https://access.redhat.com/errata/RHSA-2024:4831 | vendor advisory issue tracking |
https://access.redhat.com/errata/RHSA-2024:9315 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-1151 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2262241 | third party advisory issue tracking |
https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/ | patch |
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/ | |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/ |