CVE-2020-35498
openvswitch: limitation in the OVS packet parsing in userspace leads to DoS
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Se encontró una vulnerabilidad en openvswitch. Una limitación en la implementación del análisis de paquetes del espacio de usuario puede permitir a un usuario malicioso envíe un paquete especialmente diseñado, lo que hace que el megaflujo resultante en el kernel sea demasiado amplio, causando potencialmente una denegación de servicio. La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.4.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2020-12-17 CVE Reserved
- 2021-02-11 CVE Published
- 2021-02-12 First Exploit
- 2025-04-23 CVE Updated
- 2025-05-05 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://github.com/freddierice/cve-2020-35498-flag | 2021-02-12 |
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1908845 | 2021-06-16 | |
https://www.openwall.com/lists/oss-security/2021/02/10/4 | 2023-11-26 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openvswitch Search vendor "Openvswitch" | Openvswitch Search vendor "Openvswitch" for product "Openvswitch" | >= 2.5.0 < 2.5.12 Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.5.0 < 2.5.12" | - |
Affected
| ||||||
Openvswitch Search vendor "Openvswitch" | Openvswitch Search vendor "Openvswitch" for product "Openvswitch" | >= 2.6.0 < 2.6.10 Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.6.0 < 2.6.10" | - |
Affected
| ||||||
Openvswitch Search vendor "Openvswitch" | Openvswitch Search vendor "Openvswitch" for product "Openvswitch" | >= 2.7.0 < 2.7.13 Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.7.0 < 2.7.13" | - |
Affected
| ||||||
Openvswitch Search vendor "Openvswitch" | Openvswitch Search vendor "Openvswitch" for product "Openvswitch" | >= 2.8.0 < 2.8.11 Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.8.0 < 2.8.11" | - |
Affected
| ||||||
Openvswitch Search vendor "Openvswitch" | Openvswitch Search vendor "Openvswitch" for product "Openvswitch" | >= 2.9.0 < 2.9.9 Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.9.0 < 2.9.9" | - |
Affected
| ||||||
Openvswitch Search vendor "Openvswitch" | Openvswitch Search vendor "Openvswitch" for product "Openvswitch" | >= 2.10.0 < 2.10.7 Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.10.0 < 2.10.7" | - |
Affected
| ||||||
Openvswitch Search vendor "Openvswitch" | Openvswitch Search vendor "Openvswitch" for product "Openvswitch" | >= 2.11.0 < 2.11.6 Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.11.0 < 2.11.6" | - |
Affected
| ||||||
Openvswitch Search vendor "Openvswitch" | Openvswitch Search vendor "Openvswitch" for product "Openvswitch" | >= 2.12.0 < 2.12.3 Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.12.0 < 2.12.3" | - |
Affected
| ||||||
Openvswitch Search vendor "Openvswitch" | Openvswitch Search vendor "Openvswitch" for product "Openvswitch" | >= 2.13.0 < 2.13.3 Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.13.0 < 2.13.3" | - |
Affected
| ||||||
Openvswitch Search vendor "Openvswitch" | Openvswitch Search vendor "Openvswitch" for product "Openvswitch" | >= 2.14.0 < 2.14.2 Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.14.0 < 2.14.2" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 33 Search vendor "Fedoraproject" for product "Fedora" and version "33" | - |
Affected
|