CVE-2021-3905

A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=2019692 Issue Tracking Patch Third Party Advisory
https://ubuntu.com/security/CVE-2021-3905 Patch Third Party Advisory
https://access.redhat.com/security/cve/CVE-2021-3905 Third Party Advisory
https://github.com/openvswitch/ovs-issues/issues/226 Exploit Issue Tracking Patch Third Party Advisory
https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 Patch Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:enterprise_linux_fast_datapath:7.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:a:redhat:enterprise_linux_fast_datapath:8.0:*:*:*:*:*:*:*

Information

Published : 2022-08-23 09:15

Updated : 2022-08-26 19:01


NVD link : CVE-2021-3905

Mitre link : CVE-2021-3905


JSON object : View

CWE
CWE-401

Missing Release of Memory after Effective Lifetime

Advertisement

dedicated server usa

Products Affected

canonical

  • ubuntu_linux

redhat

  • enterprise_linux_fast_datapath

openvswitch

  • openvswitch

fedoraproject

  • fedora