CVE-2020-35498

Published: 10 February 2021

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
openvswitch
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 21.04 (Hirsute Hippo) Pending
(2.15.0-0ubuntu1)
Ubuntu 20.10 (Groovy Gorilla)
Released (2.13.1-0ubuntu1.3)
Ubuntu 20.04 LTS (Focal Fossa)
Released (2.13.1-0ubuntu0.20.04.4)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.9.8-0ubuntu0.18.04.2)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (2.5.9-0ubuntu0.16.04.3)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist