First published: Tue Feb 23 2021(Updated: )
Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) during the decoding of a RAW_ENCAP action.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openvswitch2.11 | <0:2.11.3-89.el7fd | 0:2.11.3-89.el7fd |
redhat/openvswitch2.13 | <0:2.13.0-102.el7fd | 0:2.13.0-102.el7fd |
redhat/openvswitch2.11 | <0:2.11.3-86.el8fd | 0:2.11.3-86.el8fd |
redhat/openvswitch2.13 | <0:2.13.0-114.el8fd | 0:2.13.0-114.el8fd |
redhat/openvswitch2.15 | <0:2.15.0-24.el8fd | 0:2.15.0-24.el8fd |
redhat/openvswitch2.15 | <0:2.15.0-28.el8fd | 0:2.15.0-28.el8fd |
redhat/openvsiwtch | <2.13.4 | 2.13.4 |
redhat/openvswitch | <2.15.1 | 2.15.1 |
Open vSwitch | >=2.11.0<=2.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-36980 is a vulnerability in Open vSwitch (aka openvswitch) that allows for a use-after-free in decode_NXAST_RAW_ENCAP during the decoding of a RAW_ENCAP action.
The severity of CVE-2021-36980 is high with a CVSS score of 7.5.
Open vSwitch versions 2.11.0 through 2.15.0 are affected by CVE-2021-36980.
To fix CVE-2021-36980, you need to update Open vSwitch to version 2.13.4 if you are using version 2.11.0 to 2.13.0, or to version 2.15.1 if you are using version 2.15.0.
You can find more information about CVE-2021-36980 in the referenced links: [link1](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27851), [link2](https://github.com/openvswitch/ovs/commit/77cccc74deede443e8b9102299efc869a52b65b2), [link3](https://github.com/openvswitch/ovs/commit/65c61b0c23a0d474696d7b1cea522a5016a8aeb3).