In the Linux kernel, the following vulnerability has been resolved: openvswitch: fix stack OOB read while fragmenting IPv4 packets The Linux kernel CVE team has assigned CVE-2021-46955 to this issue. Upstream advisory: https://lore.kernel.org/linux-cve-announce/2024022718-CVE-2021-46955-b50b@gregkh/T/#u
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2266469]
This was fixed for Fedora with the 5.12.3 stable kernel update.
The result of automatic check (that is developed by Alexander Larkin) for this CVE-2021-46955 is: SKIP The Fixes patch not applied yet, so unlikely that actual: d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221 YES NO YES unknown (where first YES/NO value means if related sources built).