ArchLinux: 202107-40: openvswitch: arbitrary code execution | Linux...

Advisories

Arch Linux Security Advisory ASA-202107-40
==========================================

Severity: Medium
Date    : 2021-07-20
CVE-ID  : CVE-2021-36980
Package : openvswitch
Type    : arbitrary code execution
Remote  : No
Link    : https://security.archlinux.org/AVG-2177

Summary
=======

The package openvswitch before version 2.15.1-1 is vulnerable to
arbitrary code execution.

Resolution
==========

Upgrade to 2.15.1-1.

# pacman -Syu "openvswitch>=2.15.1-1"

The problem has been fixed upstream in version 2.15.1.

Workaround
==========

None.

Description
===========

Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-
free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and
ofpacts_decode) during the decoding of a RAW_ENCAP action.

Impact
======

An attacker could execute arbitrary code through crafted Open vSwitch
Actions.

References
==========

https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openvswitch/OSV-2020-2197.yaml
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27851
https://github.com/openvswitch/ovs/commit/38744b1bcb022c611712527f039722115300f58f
https://security.archlinux.org/CVE-2021-36980

ArchLinux: 202107-40: openvswitch: arbitrary code execution

July 20, 2021
The package openvswitch before version 2.15.1-1 is vulnerable to arbitrary code execution

Summary

Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after- free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) during the decoding of a RAW_ENCAP action.

Resolution

Upgrade to 2.15.1-1.
# pacman -Syu "openvswitch>=2.15.1-1"
The problem has been fixed upstream in version 2.15.1.

References

https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openvswitch/OSV-2020-2197.yaml https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27851 https://github.com/openvswitch/ovs/commit/38744b1bcb022c611712527f039722115300f58f https://security.archlinux.org/CVE-2021-36980

Severity
CVE-ID : CVE-2021-36980
Package : openvswitch
Type : arbitrary code execution
Remote : No
Link : https://security.archlinux.org/AVG-2177

Impact

An attacker could execute arbitrary code through crafted Open vSwitch Actions.

Workaround

None.

Related News

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.