Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-3842-1 | linux-5.10 security update |
![]() |
DSA-5658-1 | linux security update |
![]() |
DSA-5681-1 | linux security update |
![]() |
EUVD-2024-16920 | A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues. |
![]() |
USN-6766-1 | Linux kernel vulnerabilities |
![]() |
USN-6766-2 | Linux kernel vulnerabilities |
![]() |
USN-6766-3 | Linux kernel (AWS) vulnerabilities |
![]() |
USN-6795-1 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-6828-1 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-6895-1 | Linux kernel vulnerabilities |
![]() |
USN-6895-2 | Linux kernel vulnerabilities |
![]() |
USN-6895-3 | Linux kernel vulnerabilities |
![]() |
USN-6895-4 | Linux kernel vulnerabilities |
![]() |
USN-6900-1 | Linux kernel vulnerabilities |
Solution
No solution given by the vendor.
Workaround
To mitigate this issue, prevent module openvswitch from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.
Fri, 22 Nov 2024 12:00:00 +0000
Wed, 13 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Metrics |
ssvc
|
Wed, 13 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 |
Tue, 12 Nov 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9::appstream cpe:/a:redhat:enterprise_linux:9::crb cpe:/a:redhat:enterprise_linux:9::nfv cpe:/a:redhat:enterprise_linux:9::realtime cpe:/o:redhat:enterprise_linux:9::baseos |
|
References |
|
Thu, 05 Sep 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Debian
Debian debian Linux Fedoraproject Fedoraproject fedora Linux Linux linux Kernel |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Debian
Debian debian Linux Fedoraproject Fedoraproject fedora Linux Linux linux Kernel |

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-09-25T14:17:09.448Z
Reserved: 2024-02-01T11:25:18.149Z
Link: CVE-2024-1151

Updated: 2024-08-01T18:26:30.497Z

Status : Modified
Published: 2024-02-11T15:15:07.890
Modified: 2024-11-21T08:49:54.940
Link: CVE-2024-1151


No data.