A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
{
"versions": [
{
"introduced": "2.5.0"
},
{
"fixed": "2.5.12"
},
{
"introduced": "2.6.0"
},
{
"fixed": "2.6.10"
},
{
"introduced": "2.7.0"
},
{
"fixed": "2.7.13"
},
{
"introduced": "2.8.0"
},
{
"fixed": "2.8.11"
},
{
"introduced": "2.9.0"
},
{
"fixed": "2.9.9"
},
{
"introduced": "2.10.0"
},
{
"fixed": "2.10.7"
},
{
"introduced": "2.11.0"
},
{
"fixed": "2.11.6"
},
{
"introduced": "2.12.0"
},
{
"fixed": "2.12.3"
},
{
"introduced": "2.13.0"
},
{
"fixed": "2.13.3"
},
{
"introduced": "2.14.0"
},
{
"fixed": "2.14.2"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "33"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-35498.json"