A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "21.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "35"
}
]
}
]
[
{
"target": {
"function": "ipf_extract_frags_from_batch",
"file": "lib/ipf.c"
},
"id": "CVE-2021-3905-2f55292c",
"digest": {
"function_hash": "59206550191124162597306143656796702807",
"length": 620.0
},
"source": "https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function"
},
{
"target": {
"file": "lib/ipf.c"
},
"id": "CVE-2021-3905-bc45e5fb",
"digest": {
"line_hashes": [
"113026978509954193576006793526224427224",
"336035935748019679433616447587111359138",
"188532591581163255405121483877259391893",
"49480125028801656152872840088186111378"
],
"threshold": 0.9
},
"source": "https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349",
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-3905.json"