CVE-2021-36980: Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) during the decoding of a RAW_ENCAP action. 2.14 patch: https://github.com/openvswitch/ovs/commit/8ce8dc34b5f73b30ce0c1869af9947013c3c6575 2.15 patch: https://github.com/openvswitch/ovs/commit/38744b1bcb022c611712527f039722115300f58f The vulnerability is fixed in the 2.15 branch with 2.15.1 and there seems to be no release with 2.14's fix.
Package list is empty or all packages have requested keywords.
Ping.
Please stabilize when ready.
CVE-2021-3905: A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments. RedHat bug: https://bugzilla.redhat.com/show_bug.cgi?id=2019692 Issue: https://github.com/openvswitch/ovs-issues/issues/226 Commit: https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 Commit is in 2.17.0 and beyond.