A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues.
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "38"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "39"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.7.8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.8-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.8-rc1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.8-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.8-rc3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.8-rc4"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-1151.json"