Subject: [ASA-202107-40] openvswitch: arbitrary code execution Arch Linux Security Advisory ASA-202107-40 ========================================== Severity: Medium Date : 2021-07-20 CVE-ID : CVE-2021-36980 Package : openvswitch Type : arbitrary code execution Remote : No Link : https://security.archlinux.org/AVG-2177 Summary ======= The package openvswitch before version 2.15.1-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 2.15.1-1. # pacman -Syu "openvswitch>=2.15.1-1" The problem has been fixed upstream in version 2.15.1. Workaround ========== None. Description =========== Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after- free in decode_NXAST_RAW_ENCAP (called from ofpact_decode and ofpacts_decode) during the decoding of a RAW_ENCAP action. Impact ====== An attacker could execute arbitrary code through crafted Open vSwitch Actions. References ========== https://github.com/google/oss-fuzz-vulns/blob/main/vulns/openvswitch/OSV-2020-2197.yaml https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=27851 https://github.com/openvswitch/ovs/commit/38744b1bcb022c611712527f039722115300f58f https://security.archlinux.org/CVE-2021-36980