CVE-2021-3905
Publication date 8 November 2021
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
Status
Package | Ubuntu Release | Status |
---|---|---|
openvswitch | 22.04 LTS jammy |
Not affected
|
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Ignored end of standard support |
Notes
mdeslaur
introduced by https://github.com/openvswitch/ovs/commit/640d4db788eda96bb904abcfc7de2327107bafe1
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-5242-1
- Open vSwitch vulnerability
- 20 January 2022