summaryrefslogtreecommitdiffstats
path: root/recipes-networking/openvswitch/openvswitch-git/CVE-2021-3905.patch
diff options
context:
space:
mode:
authorHitendra Prajapati <hprajapati@mvista.com>2022-09-20 10:50:18 +0530
committerBruce Ashfield <bruce.ashfield@gmail.com>2022-09-20 10:18:31 -0400
commitbeea119eb529b4a11f266004aee8b548427aea39 (patch)
treeb7a6e56057a8aea513ac64a0b17d8c32734947a2 /recipes-networking/openvswitch/openvswitch-git/CVE-2021-3905.patch
parentcb95344976dd44081078abd83d8821e01b10c211 (diff)
downloadmeta-virtualization-beea119eb529b4a11f266004aee8b548427aea39.tar.gz
openvswitch: CVE-2021-3905 External triggered memory leak
Source: https://gitlab.com/libvirt/libvirt MR: 121447 Type: Security Fix Disposition: Backport from https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349 ChangeID: 8f3a31bbf11be6a5aef9b7cf6ed1c2e56c28ff44 Description: CVE-2021-3905 openvswitch: External triggered memory leak in Open vSwitch while processing fragmented packets. Affects openvswitch < 2.17.0 Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com> Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Diffstat (limited to 'recipes-networking/openvswitch/openvswitch-git/CVE-2021-3905.patch')
-rw-r--r--recipes-networking/openvswitch/openvswitch-git/CVE-2021-3905.patch28
1 files changed, 28 insertions, 0 deletions
diff --git a/recipes-networking/openvswitch/openvswitch-git/CVE-2021-3905.patch b/recipes-networking/openvswitch/openvswitch-git/CVE-2021-3905.patch
new file mode 100644
index 00000000..beff3944
--- /dev/null
+++ b/recipes-networking/openvswitch/openvswitch-git/CVE-2021-3905.patch
@@ -0,0 +1,28 @@
1From 9f66c8c98f1eb55e0fb536bfaf7afaecda136b0a Mon Sep 17 00:00:00 2001
2From: Hitendra Prajapati <hprajapati@mvista.com>
3Date: Tue, 20 Sep 2022 10:06:04 +0530
4Subject: [PATCH] CVE-2021-3905
5
6Upstream-Status: Backport [https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349]
7CVE: CVE-2021-3905
8Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
9---
10 lib/ipf.c | 2 ++
11 1 file changed, 2 insertions(+)
12
13diff --git a/lib/ipf.c b/lib/ipf.c
14index 446e89d13..66203f642 100644
15--- a/lib/ipf.c
16+++ b/lib/ipf.c
17@@ -945,6 +945,8 @@ ipf_extract_frags_from_batch(struct ipf *ipf, struct dp_packet_batch *pb,
18 if (!ipf_handle_frag(ipf, pkt, dl_type, zone, now, hash_basis,
19 pb->do_not_steal)) {
20 dp_packet_batch_refill(pb, pkt, pb_idx);
21+ } else {
22+ dp_packet_delete(pkt);
23 }
24 ovs_mutex_unlock(&ipf->ipf_lock);
25 } else {
26--
272.25.1
28