A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2021-3905 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2019692 | Issue Tracking Patch Third Party Advisory |
| https://github.com/openvswitch/ovs-issues/issues/226 | Exploit Issue Tracking Patch Third Party Advisory |
| https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 | Patch Third Party Advisory |
| https://security.gentoo.org/glsa/202311-16 | |
| https://ubuntu.com/security/CVE-2021-3905 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2022-08-23 16:15
Updated : 2023-11-26 11:15
NVD link : CVE-2021-3905
Mitre link : CVE-2021-3905
CVE.ORG link : CVE-2021-3905
JSON object : View
Products Affected
openvswitch
- openvswitch
redhat
- enterprise_linux_fast_datapath
canonical
- ubuntu_linux
fedoraproject
- fedora
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
