Vulnerability Name: | CVE-2021-3905 (CCN-234360) | ||||||||||||
Assigned: | 2021-10-26 | ||||||||||||
Published: | 2022-08-02 | ||||||||||||
Updated: | 2022-08-27 | ||||||||||||
Summary: | A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments. | ||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||
Vulnerability Type: | CWE-401 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-3905 Source: MISC Type: Third Party Advisory https://access.redhat.com/security/cve/CVE-2021-3905 Source: CCN Type: Red Hat Bugzilla - Bug 2019692 (CVE-2021-3905) - CVE-2021-3905 openvswitch: External triggered memory leak in Open vSwitch while processing fragmented packets Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=2019692 Source: XF Type: UNKNOWN openvswitch-cve20213905-dos(234360) Source: CCN Type: ovs-issues GIT Repository ipf memleak #226 Source: MISC Type: Exploit, Issue Tracking, Patch, Third Party Advisory https://github.com/openvswitch/ovs-issues/issues/226 Source: MISC Type: Patch, Third Party Advisory https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 Source: MISC Type: Patch, Third Party Advisory https://ubuntu.com/security/CVE-2021-3905 Source: CCN Type: Mend Vulnerability Database CVE-2021-3905 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |