A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2019692 | Issue Tracking Patch Third Party Advisory |
https://ubuntu.com/security/CVE-2021-3905 | Patch Third Party Advisory |
https://access.redhat.com/security/cve/CVE-2021-3905 | Third Party Advisory |
https://github.com/openvswitch/ovs-issues/issues/226 | Exploit Issue Tracking Patch Third Party Advisory |
https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2022-08-23 09:15
Updated : 2022-08-26 19:01
NVD link : CVE-2021-3905
Mitre link : CVE-2021-3905
JSON object : View
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
Products Affected
canonical
- ubuntu_linux
redhat
- enterprise_linux_fast_datapath
openvswitch
- openvswitch
fedoraproject
- fedora