A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=2019692 | Issue Tracking Patch Third Party Advisory |
| https://ubuntu.com/security/CVE-2021-3905 | Patch Third Party Advisory |
| https://access.redhat.com/security/cve/CVE-2021-3905 | Third Party Advisory |
| https://github.com/openvswitch/ovs-issues/issues/226 | Exploit Issue Tracking Patch Third Party Advisory |
| https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2022-08-23 09:15
Updated : 2022-08-26 19:01
NVD link : CVE-2021-3905
Mitre link : CVE-2021-3905
JSON object : View
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
Products Affected
canonical
- ubuntu_linux
redhat
- enterprise_linux_fast_datapath
openvswitch
- openvswitch
fedoraproject
- fedora


