Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2020-35498: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

SUSE: CVE-2020-35498: SUSE Linux Security Advisory

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
02/10/2021
Created
02/17/2021
Added
02/12/2021
Modified
02/04/2022

Description

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

Solution(s)

  • suse-upgrade-libopenvswitch-2_11-0
  • suse-upgrade-libopenvswitch-2_13-0
  • suse-upgrade-libopenvswitch-2_14-0
  • suse-upgrade-libopenvswitch-2_8-0
  • suse-upgrade-libovn-20_03-0
  • suse-upgrade-libovn-20_06-0
  • suse-upgrade-openvswitch
  • suse-upgrade-openvswitch-devel
  • suse-upgrade-openvswitch-doc
  • suse-upgrade-openvswitch-dpdk
  • suse-upgrade-openvswitch-dpdk-switch
  • suse-upgrade-openvswitch-ipsec
  • suse-upgrade-openvswitch-pki
  • suse-upgrade-openvswitch-switch
  • suse-upgrade-openvswitch-test
  • suse-upgrade-openvswitch-vtep
  • suse-upgrade-ovn
  • suse-upgrade-ovn-central
  • suse-upgrade-ovn-devel
  • suse-upgrade-ovn-doc
  • suse-upgrade-ovn-docker
  • suse-upgrade-ovn-host
  • suse-upgrade-ovn-vtep
  • suse-upgrade-python2-ovs
  • suse-upgrade-python3-ovs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;