[Bugs] [Bug 13292] New: [CVE 21] openvswitch 2.16.1 CVEs found
bugzilla
bugzilla на rosalinux.ru
Ср Май 3 17:01:36 MSK 2023
https://bugzilla.rosalinux.ru/show_bug.cgi?id=13292
Platform: 2021.1
Bug ID: 13292
Summary: [CVE 21] openvswitch 2.16.1 CVEs found
Classification: ROSA-based products
Product: ROSA Fresh
Version: All
Hardware: All
URL: CVE-2019-25076, CVE-2021-3905, CVE-2022-4337,
CVE-2022-4338,
OS: Linux
Status: CONFIRMED
Severity: normal
Priority: Normal
Component: System (kernel, glibc, systemd, bash, PAM...)
Assignee: bugs на lists.rosalinux.ru
Reporter: y.tumanov на rosalinux.ru
QA Contact: bugs на lists.rosalinux.ru
CC: s.matveev на rosalinux.ru, y.tumanov на rosalinux.ru
Target Milestone: ---
Flags: secteam_verified?
Please patch CVEs for package openvswitch version 2.16.1
INFO (CVEs are): openvswitch 2.16.1
cves found
CVE-2019-25076
Desc: The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2
and 3.0.0 allows remote attackers to cause a denial of service (delays of
legitimate traffic) via crafted packet data that requires excessive evaluation
time within the packet classification algorithm for the MegaFlow cache, aka a
Tuple Space Explosion (TSE) attack.
Link: https://nvd.nist.gov/vuln/detail/CVE-2019-25076
Severity: MEDIUM
CVE-2021-3905
Desc: A memory leak was found in Open vSwitch (OVS) during userspace IP
fragmentation processing. An attacker could use this flaw to potentially
exhaust available memory by keeping sending packet fragments.
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-3905
Severity: HIGH
CVE-2022-4337
Desc: An out-of-bounds read in Organization Specific TLV was found in various
versions of OpenvSwitch.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-4337
Severity: CRITICAL
CVE-2022-4338
Desc: An integer underflow in Organization Specific TLV was found in various
versions of OpenvSwitch.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-4338
Severity: CRITICAL
--
You are receiving this mail because:
You are the QA Contact for the bug.
You are the assignee for the bug.
----------- следущая часть -----------
Вложение в формате HTML было извлечено…
URL: <http://lists.rosalinux.ru/pipermail/bugs/attachments/20230503/aae61f9c/attachment-0001.html>
Подробная информация о списке рассылки Bugs