A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2019692 | issue tracking third party advisory patch |
https://access.redhat.com/security/cve/CVE-2021-3905 | third party advisory |
https://ubuntu.com/security/CVE-2021-3905 | third party advisory patch |
https://github.com/openvswitch/ovs-issues/issues/226 | issue tracking patch exploit third party advisory |
https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 | third party advisory patch |
https://security.gentoo.org/glsa/202311-16 | vendor advisory |