vulnerability
CentOS Linux: CVE-2020-35498: Moderate: openvswitch2.13 security and bug fix update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | 2021-02-11 | 2021-02-12 | 2023-05-25 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
2021-02-11
Added
2021-02-12
Modified
2023-05-25
Description
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Solution(s)
centos-upgrade-network-scripts-openvswitch2-11centos-upgrade-network-scripts-openvswitch2-13centos-upgrade-openvswitchcentos-upgrade-openvswitch-debuginfocentos-upgrade-openvswitch-develcentos-upgrade-openvswitch-testcentos-upgrade-openvswitch2-11centos-upgrade-openvswitch2-11-debuginfocentos-upgrade-openvswitch2-11-debugsourcecentos-upgrade-openvswitch2-11-develcentos-upgrade-openvswitch2-11-testcentos-upgrade-openvswitch2-13centos-upgrade-openvswitch2-13-debuginfocentos-upgrade-openvswitch2-13-debugsourcecentos-upgrade-openvswitch2-13-develcentos-upgrade-openvswitch2-13-ipseccentos-upgrade-openvswitch2-13-testcentos-upgrade-python-openvswitchcentos-upgrade-python-openvswitch2-11centos-upgrade-python3-openvswitch2-11centos-upgrade-python3-openvswitch2-11-debuginfocentos-upgrade-python3-openvswitch2-13centos-upgrade-python3-openvswitch2-13-debuginfo
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.