Логотип exploitDog
bind:CVE-2021-46955
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-46955

Количество 66

Количество 66

ubuntu логотип

CVE-2021-46955

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix stack OOB read while fragmenting IPv4 packets running openvswitch on kernels built with KASAN, it's possible to see the following splat while testing fragmentation of IPv4 packets: BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60 Read of size 1 at addr ffff888112fc713c by task handler2/1367 CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014 Call Trace: dump_stack+0x92/0xc1 print_address_description.constprop.7+0x1a/0x150 kasan_report.cold.13+0x7f/0x111 ip_do_fragment+0x1b03/0x1f60 ovs_fragment+0x5bf/0x840 [openvswitch] do_execute_actions+0x1bd5/0x2400 [openvswitch] ovs_execute_actions+0xc8/0x3d0 [openvswitch] ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch] genl_family_rcv_msg_doit.isra.15+0x227/0x2d0 genl_rcv_msg+0x287/0x490 netlink_rcv_skb+0x120/0x380 genl_rcv+0x24/0x40 netlink_unicast+0x439...

CVSS3: 7.1
EPSS: Низкий
redhat логотип

CVE-2021-46955

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix stack OOB read while fragmenting IPv4 packets running openvswitch on kernels built with KASAN, it's possible to see the following splat while testing fragmentation of IPv4 packets: BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60 Read of size 1 at addr ffff888112fc713c by task handler2/1367 CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014 Call Trace: dump_stack+0x92/0xc1 print_address_description.constprop.7+0x1a/0x150 kasan_report.cold.13+0x7f/0x111 ip_do_fragment+0x1b03/0x1f60 ovs_fragment+0x5bf/0x840 [openvswitch] do_execute_actions+0x1bd5/0x2400 [openvswitch] ovs_execute_actions+0xc8/0x3d0 [openvswitch] ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch] genl_family_rcv_msg_doit.isra.15+0x227/0x2d0 genl_rcv_msg+0x287/0x490 netlink_rcv_skb+0x120/0x380 genl_rcv+0x24/0x40 netlink_unicast+0x439...

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2021-46955

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix stack OOB read while fragmenting IPv4 packets running openvswitch on kernels built with KASAN, it's possible to see the following splat while testing fragmentation of IPv4 packets: BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60 Read of size 1 at addr ffff888112fc713c by task handler2/1367 CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014 Call Trace: dump_stack+0x92/0xc1 print_address_description.constprop.7+0x1a/0x150 kasan_report.cold.13+0x7f/0x111 ip_do_fragment+0x1b03/0x1f60 ovs_fragment+0x5bf/0x840 [openvswitch] do_execute_actions+0x1bd5/0x2400 [openvswitch] ovs_execute_actions+0xc8/0x3d0 [openvswitch] ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch] genl_family_rcv_msg_doit.isra.15+0x227/0x2d0 genl_rcv_msg+0x287/0x490 netlink_rcv_skb+0x120/0x380 genl_rcv+0

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2021-46955

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: o ...

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-6mwq-mrw3-3m6c

почти 2 года назад

In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix stack OOB read while fragmenting IPv4 packets running openvswitch on kernels built with KASAN, it's possible to see the following splat while testing fragmentation of IPv4 packets: BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60 Read of size 1 at addr ffff888112fc713c by task handler2/1367 CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014 Call Trace: dump_stack+0x92/0xc1 print_address_description.constprop.7+0x1a/0x150 kasan_report.cold.13+0x7f/0x111 ip_do_fragment+0x1b03/0x1f60 ovs_fragment+0x5bf/0x840 [openvswitch] do_execute_actions+0x1bd5/0x2400 [openvswitch] ovs_execute_actions+0xc8/0x3d0 [openvswitch] ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch] genl_family_rcv_msg_doit.isra.15+0x227/0x2d0 genl_rcv_msg+0x287/0x490 netlink_rcv_skb+0x120/0x380 genl_rc...

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2025-00824

почти 5 лет назад

Уязвимость компонента net/openvswitch/actions.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2147-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2143-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2123-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2202-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 51 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2145-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2124-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2115-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2109-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2121-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2559-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2139-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2130-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2120-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2822-1

больше 1 года назад

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-46955

In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix stack OOB read while fragmenting IPv4 packets running openvswitch on kernels built with KASAN, it's possible to see the following splat while testing fragmentation of IPv4 packets: BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60 Read of size 1 at addr ffff888112fc713c by task handler2/1367 CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014 Call Trace: dump_stack+0x92/0xc1 print_address_description.constprop.7+0x1a/0x150 kasan_report.cold.13+0x7f/0x111 ip_do_fragment+0x1b03/0x1f60 ovs_fragment+0x5bf/0x840 [openvswitch] do_execute_actions+0x1bd5/0x2400 [openvswitch] ovs_execute_actions+0xc8/0x3d0 [openvswitch] ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch] genl_family_rcv_msg_doit.isra.15+0x227/0x2d0 genl_rcv_msg+0x287/0x490 netlink_rcv_skb+0x120/0x380 genl_rcv+0x24/0x40 netlink_unicast+0x439...

CVSS3: 7.1
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2021-46955

In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix stack OOB read while fragmenting IPv4 packets running openvswitch on kernels built with KASAN, it's possible to see the following splat while testing fragmentation of IPv4 packets: BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60 Read of size 1 at addr ffff888112fc713c by task handler2/1367 CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014 Call Trace: dump_stack+0x92/0xc1 print_address_description.constprop.7+0x1a/0x150 kasan_report.cold.13+0x7f/0x111 ip_do_fragment+0x1b03/0x1f60 ovs_fragment+0x5bf/0x840 [openvswitch] do_execute_actions+0x1bd5/0x2400 [openvswitch] ovs_execute_actions+0xc8/0x3d0 [openvswitch] ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch] genl_family_rcv_msg_doit.isra.15+0x227/0x2d0 genl_rcv_msg+0x287/0x490 netlink_rcv_skb+0x120/0x380 genl_rcv+0x24/0x40 netlink_unicast+0x439...

CVSS3: 5.3
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2021-46955

In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix stack OOB read while fragmenting IPv4 packets running openvswitch on kernels built with KASAN, it's possible to see the following splat while testing fragmentation of IPv4 packets: BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60 Read of size 1 at addr ffff888112fc713c by task handler2/1367 CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014 Call Trace: dump_stack+0x92/0xc1 print_address_description.constprop.7+0x1a/0x150 kasan_report.cold.13+0x7f/0x111 ip_do_fragment+0x1b03/0x1f60 ovs_fragment+0x5bf/0x840 [openvswitch] do_execute_actions+0x1bd5/0x2400 [openvswitch] ovs_execute_actions+0xc8/0x3d0 [openvswitch] ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch] genl_family_rcv_msg_doit.isra.15+0x227/0x2d0 genl_rcv_msg+0x287/0x490 netlink_rcv_skb+0x120/0x380 genl_rcv+0

CVSS3: 7.1
0%
Низкий
почти 2 года назад
debian логотип
CVE-2021-46955

In the Linux kernel, the following vulnerability has been resolved: o ...

CVSS3: 7.1
0%
Низкий
почти 2 года назад
github логотип
GHSA-6mwq-mrw3-3m6c

In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix stack OOB read while fragmenting IPv4 packets running openvswitch on kernels built with KASAN, it's possible to see the following splat while testing fragmentation of IPv4 packets: BUG: KASAN: stack-out-of-bounds in ip_do_fragment+0x1b03/0x1f60 Read of size 1 at addr ffff888112fc713c by task handler2/1367 CPU: 0 PID: 1367 Comm: handler2 Not tainted 5.12.0-rc6+ #418 Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014 Call Trace: dump_stack+0x92/0xc1 print_address_description.constprop.7+0x1a/0x150 kasan_report.cold.13+0x7f/0x111 ip_do_fragment+0x1b03/0x1f60 ovs_fragment+0x5bf/0x840 [openvswitch] do_execute_actions+0x1bd5/0x2400 [openvswitch] ovs_execute_actions+0xc8/0x3d0 [openvswitch] ovs_packet_cmd_execute+0xa39/0x1150 [openvswitch] genl_family_rcv_msg_doit.isra.15+0x227/0x2d0 genl_rcv_msg+0x287/0x490 netlink_rcv_skb+0x120/0x380 genl_rc...

CVSS3: 7.1
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2025-00824

Уязвимость компонента net/openvswitch/actions.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.1
0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2024:2147-1

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2143-1

Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2123-1

Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP2)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2202-1

Security update for the Linux Kernel (Live Patch 51 for SLE 12 SP5)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2145-1

Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP3)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2124-1

Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP3)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2115-1

Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2109-1

Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP2)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2121-1

Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2559-1

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2139-1

Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2130-1

Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2120-1

Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:2822-1

Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5)

больше 1 года назад

Уязвимостей на страницу