CVE-2020-35498

Source
https://cve.org/CVERecord?id=CVE-2020-35498
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-35498.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-35498
Downstream
Related
Published
2021-02-11T18:15:15.677Z
Modified
2026-02-15T00:44:44.106320Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

References

Affected packages

Git / gitlab.gnome.org/GNOME/glib

Affected versions

Other
GLIB_2_12_0
GLIB_2_12_1
GLIB_2_12_2
GLIB_2_14_0
GLIB_2_14_1
glib-2-12-branchpoint

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-35498.json"