CVE-2020-35498
Published: 10 February 2021
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
openvswitch Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 21.04 (Hirsute Hippo) |
Pending
(2.15.0-0ubuntu1)
|
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(2.13.1-0ubuntu1.3)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(2.13.1-0ubuntu0.20.04.4)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(2.9.8-0ubuntu0.18.04.2)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(2.5.9-0ubuntu0.16.04.3)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|