CVE-2020-35498
Published: 10 February 2021
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
openvswitch Launchpad, Ubuntu, Debian |
bionic |
Released
(2.9.8-0ubuntu0.18.04.2)
|
focal |
Released
(2.13.1-0ubuntu0.20.04.4)
|
|
groovy |
Released
(2.13.1-0ubuntu1.3)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Released
(2.5.9-0ubuntu0.16.04.3)
|