A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2571-1 | openvswitch security update |
![]() |
DSA-4852-1 | openvswitch security update |
![]() |
EUVD-2020-23167 | A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. |
![]() |
USN-4729-1 | Open vSwitch vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 23 Apr 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-04-23T19:46:26.834Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2020-35498

Updated: 2024-08-04T17:02:08.207Z

Status : Modified
Published: 2021-02-11T18:15:15.677
Modified: 2025-04-23T20:15:20.000
Link: CVE-2020-35498


No data.