Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) during the decoding of a RAW_ENCAP action.
2.14 patch: https://github.com/openvswitch/ovs/commit/8ce8dc34b5f73b30ce0c1869af9947013c3c6575
2.15 patch: https://github.com/openvswitch/ovs/commit/38744b1bcb022c611712527f039722115300f58f
The vulnerability is fixed in the 2.15 branch with 2.15.1 and there seems to
be no release with 2.14's fix.
Package list is empty or all packages have requested keywords.
Please stabilize when ready.
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
RedHat bug: https://bugzilla.redhat.com/show_bug.cgi?id=2019692
Commit is in 2.17.0 and beyond.