From eae04d4fd409ae4ff3f5a4be778903125d03dadb Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 11 Feb 2024 17:00:28 +0000 Subject: [PATCH] Auto-Update: 2024-02-11T17:00:24.702525+00:00 --- CVE-2024/CVE-2024-11xx/CVE-2024-1151.json | 63 +++++++++++++++++++++++ README.md | 8 +-- 2 files changed, 67 insertions(+), 4 deletions(-) create mode 100644 CVE-2024/CVE-2024-11xx/CVE-2024-1151.json diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1151.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1151.json new file mode 100644 index 00000000000..41344af431c --- /dev/null +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1151.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-1151", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-02-11T15:15:07.890", + "lastModified": "2024-02-11T15:15:07.890", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was reported in the Open vSwitch sub-component in the Linux Kernel. The flaw occurs when a recursive operation of code push recursively calls into the code block. The OVS module does not validate the stack depth, pushing too many frames and causing a stack overflow. As a result, this can lead to a crash or other related issues." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-1151", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262241", + "source": "secalert@redhat.com" + }, + { + "url": "https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index feead8bafc5..36e7bbef409 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-11T11:00:24.134168+00:00 +2024-02-11T17:00:24.702525+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-11T09:15:07.633000+00:00 +2024-02-11T15:15:07.890000+00:00 ``` ### Last Data Feed Release @@ -29,14 +29,14 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -238119 +238120 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -* [CVE-2024-21875](CVE-2024/CVE-2024-218xx/CVE-2024-21875.json) (`2024-02-11T09:15:07.633`) +* [CVE-2024-1151](CVE-2024/CVE-2024-11xx/CVE-2024-1151.json) (`2024-02-11T15:15:07.890`) ### CVEs modified in the last Commit