Description
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2571-1 | openvswitch security update |
Debian DSA |
DSA-4852-1 | openvswitch security update |
EUVD |
EUVD-2020-23167 | A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. |
Ubuntu USN |
USN-4729-1 | Open vSwitch vulnerability |
References
History
Wed, 23 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-04-23T19:46:26.834Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2020-35498
Updated: 2024-08-04T17:02:08.207Z
Status : Modified
Published: 2021-02-11T18:15:15.677
Modified: 2025-04-23T20:15:20.000
Link: CVE-2020-35498
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN