First published: Wed Nov 03 2021(Updated: )
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openvswitch Openvswitch | <2.17.0 | |
Redhat Enterprise Linux Fast Datapath | =7.0 | |
Redhat Enterprise Linux Fast Datapath | =8.0 | |
Canonical Ubuntu Linux | =21.10 | |
Fedoraproject Fedora | =35 | |
redhat/openvswitch | <2.12 | 2.12 |
debian/openvswitch | 2.15.0+ds1-2+deb11u5 3.1.0-2+deb12u1 3.4.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3905 is a vulnerability in Open vSwitch (OVS) that causes a memory leak during userspace IP fragmentation processing.
CVE-2021-3905 has a severity value of 7.5 (high).
CVE-2021-3905 can potentially exhaust available memory in Open vSwitch by keeping sending packet fragments.
Openvswitch 2.17.0, Redhat Enterprise Linux Fast Datapath 7.0 and 8.0, Canonical Ubuntu Linux 21.10, and Fedoraproject Fedora 35 are affected by CVE-2021-3905.
To fix CVE-2021-3905, it is recommended to update to Openvswitch 2.10.7+ds1-0+deb10u1 or later, Redhat Enterprise Linux Fast Datapath 2.12 or later, or Ubuntu Openvswitch 2.16.0-0ubuntu2.1 or later.