vulnerability
Red Hat: CVE-2020-35498: Moderate: openvswitch2.13 security and bug fix update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | 2021-02-11 | 2021-02-12 | 2021-05-21 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
2021-02-11
Added
2021-02-12
Modified
2021-05-21
Description
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Solution(s)
redhat-upgrade-network-scripts-openvswitch2-11redhat-upgrade-network-scripts-openvswitch2-13redhat-upgrade-openvswitchredhat-upgrade-openvswitch-debuginforedhat-upgrade-openvswitch-develredhat-upgrade-openvswitch-testredhat-upgrade-openvswitch2-11redhat-upgrade-openvswitch2-11-debuginforedhat-upgrade-openvswitch2-11-debugsourceredhat-upgrade-openvswitch2-11-develredhat-upgrade-openvswitch2-11-testredhat-upgrade-openvswitch2-13redhat-upgrade-openvswitch2-13-debuginforedhat-upgrade-openvswitch2-13-debugsourceredhat-upgrade-openvswitch2-13-develredhat-upgrade-openvswitch2-13-ipsecredhat-upgrade-openvswitch2-13-testredhat-upgrade-python-openvswitchredhat-upgrade-python-openvswitch2-11redhat-upgrade-python3-openvswitch2-11redhat-upgrade-python3-openvswitch2-11-debuginforedhat-upgrade-python3-openvswitch2-13redhat-upgrade-python3-openvswitch2-13-debuginfo
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.