CVE-2024-1151
Linux Kernel vulnerability analysis and mitigation

Overview

A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel (CVE-2024-1151). The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. The vulnerability was discovered in February 2024 and affects Linux Kernel versions up to 6.7.8 (NVD, Red Hat).

Technical details

The vulnerability exists in the Open vSwitch kernel module's Netlink copy code. When processing action lists from netlink sockets, the module creates a copy for action set processing. While the module tracks execution depth during packet processing, it fails to check recursion depth during netlink processing, assuming the kernel stack can handle any size. This particularly affects actions like sample(), clone(), and dec_ttl() that include additional recursive operations. The issue has a CVSS v3.1 Base Score of 5.5 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD, Kernel Patch).

Impact

The vulnerability can lead to a system crash or other related issues when exploited, primarily resulting in a denial of service condition. The impact is limited to local attacks and requires low privileges to execute (NVD).

Mitigation and workarounds

The issue has been fixed in Linux kernel 6.7.5 and later versions. The fix includes implementing a depth limit during the __ovs_nla_copy_actions() call to ensure it doesn't exceed the maximum that the OVS userspace could generate for a clone(). Various Linux distributions have released patches, including Red Hat Enterprise Linux, Fedora, and Ubuntu (Kernel Patch, Red Hat).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68753HIGH7.8
  • Linux KernelLinux Kernel
  • linux-realtime
NoYesJan 05, 2026
CVE-2025-68756HIGH7.1
  • Linux KernelLinux Kernel
  • linux-oracle
NoYesJan 05, 2026
CVE-2025-68764MEDIUM5.5
  • Linux KernelLinux Kernel
  • linux-realtime
NoYesJan 05, 2026
CVE-2025-68758MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-core
NoYesJan 05, 2026
CVE-2025-68762N/AN/A
  • Linux KernelLinux Kernel
  • kernel
NoYesJan 05, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management