CVE-2021-36980: Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) during the decoding of a RAW_ENCAP action. 2.14 patch: https://github.com/openvswitch/ovs/commit/8ce8dc34b5f73b30ce0c1869af9947013c3c6575 2.15 patch: https://github.com/openvswitch/ovs/commit/38744b1bcb022c611712527f039722115300f58f The vulnerability is fixed in the 2.15 branch with 2.15.1 and there seems to be no release with 2.14's fix.
Package list is empty or all packages have requested keywords.
Ping.
Please stabilize when ready.
CVE-2021-3905: A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments. RedHat bug: https://bugzilla.redhat.com/show_bug.cgi?id=2019692 Issue: https://github.com/openvswitch/ovs-issues/issues/226 Commit: https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 Commit is in 2.17.0 and beyond.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=6109db58da8356109819f2e31a15acb75bbd5b61 commit 6109db58da8356109819f2e31a15acb75bbd5b61 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2023-11-26 10:06:58 +0000 Commit: Hans de Graaff <graaff@gentoo.org> CommitDate: 2023-11-26 10:07:30 +0000 [ GLSA 202311-16 ] Open vSwitch: Multiple Vulnerabilities Bug: https://bugs.gentoo.org/765346 Bug: https://bugs.gentoo.org/769995 Bug: https://bugs.gentoo.org/803107 Bug: https://bugs.gentoo.org/887561 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Hans de Graaff <graaff@gentoo.org> glsa-202311-16.xml | 51 +++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 51 insertions(+)