Vulnerability Details CVE-2020-35498
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.05
EPSS Ranking 89.3%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 7.8
Products affected by CVE-2020-35498
-
cpe:2.3:a:openvswitch:openvswitch:2.10.0
-
cpe:2.3:a:openvswitch:openvswitch:2.10.1
-
cpe:2.3:a:openvswitch:openvswitch:2.10.2
-
cpe:2.3:a:openvswitch:openvswitch:2.10.3
-
cpe:2.3:a:openvswitch:openvswitch:2.10.4
-
cpe:2.3:a:openvswitch:openvswitch:2.10.5
-
cpe:2.3:a:openvswitch:openvswitch:2.10.6
-
cpe:2.3:a:openvswitch:openvswitch:2.11.0
-
cpe:2.3:a:openvswitch:openvswitch:2.11.1
-
cpe:2.3:a:openvswitch:openvswitch:2.11.2
-
cpe:2.3:a:openvswitch:openvswitch:2.11.3
-
cpe:2.3:a:openvswitch:openvswitch:2.11.4
-
cpe:2.3:a:openvswitch:openvswitch:2.11.5
-
cpe:2.3:a:openvswitch:openvswitch:2.12.0
-
cpe:2.3:a:openvswitch:openvswitch:2.12.1
-
cpe:2.3:a:openvswitch:openvswitch:2.12.2
-
cpe:2.3:a:openvswitch:openvswitch:2.13.0
-
cpe:2.3:a:openvswitch:openvswitch:2.13.1
-
cpe:2.3:a:openvswitch:openvswitch:2.13.2
-
cpe:2.3:a:openvswitch:openvswitch:2.14.0
-
cpe:2.3:a:openvswitch:openvswitch:2.14.1
-
cpe:2.3:a:openvswitch:openvswitch:2.5.0
-
cpe:2.3:a:openvswitch:openvswitch:2.5.1
-
cpe:2.3:a:openvswitch:openvswitch:2.5.10
-
cpe:2.3:a:openvswitch:openvswitch:2.5.11
-
cpe:2.3:a:openvswitch:openvswitch:2.5.2
-
cpe:2.3:a:openvswitch:openvswitch:2.5.3
-
cpe:2.3:a:openvswitch:openvswitch:2.5.4
-
cpe:2.3:a:openvswitch:openvswitch:2.5.5
-
cpe:2.3:a:openvswitch:openvswitch:2.5.6
-
cpe:2.3:a:openvswitch:openvswitch:2.5.7
-
cpe:2.3:a:openvswitch:openvswitch:2.5.8
-
cpe:2.3:a:openvswitch:openvswitch:2.5.9
-
cpe:2.3:a:openvswitch:openvswitch:2.6.0
-
cpe:2.3:a:openvswitch:openvswitch:2.6.1
-
cpe:2.3:a:openvswitch:openvswitch:2.6.2
-
cpe:2.3:a:openvswitch:openvswitch:2.6.3
-
cpe:2.3:a:openvswitch:openvswitch:2.6.4
-
cpe:2.3:a:openvswitch:openvswitch:2.6.5
-
cpe:2.3:a:openvswitch:openvswitch:2.6.6
-
cpe:2.3:a:openvswitch:openvswitch:2.6.7
-
cpe:2.3:a:openvswitch:openvswitch:2.6.8
-
cpe:2.3:a:openvswitch:openvswitch:2.6.9
-
cpe:2.3:a:openvswitch:openvswitch:2.7.0
-
cpe:2.3:a:openvswitch:openvswitch:2.7.1
-
cpe:2.3:a:openvswitch:openvswitch:2.7.10
-
cpe:2.3:a:openvswitch:openvswitch:2.7.11
-
cpe:2.3:a:openvswitch:openvswitch:2.7.12
-
cpe:2.3:a:openvswitch:openvswitch:2.7.2
-
cpe:2.3:a:openvswitch:openvswitch:2.7.3
-
cpe:2.3:a:openvswitch:openvswitch:2.7.4
-
cpe:2.3:a:openvswitch:openvswitch:2.7.5
-
cpe:2.3:a:openvswitch:openvswitch:2.7.6
-
cpe:2.3:a:openvswitch:openvswitch:2.7.7
-
cpe:2.3:a:openvswitch:openvswitch:2.7.9
-
cpe:2.3:a:openvswitch:openvswitch:2.8.0
-
cpe:2.3:a:openvswitch:openvswitch:2.8.1
-
cpe:2.3:a:openvswitch:openvswitch:2.8.10
-
cpe:2.3:a:openvswitch:openvswitch:2.8.2
-
cpe:2.3:a:openvswitch:openvswitch:2.8.3
-
cpe:2.3:a:openvswitch:openvswitch:2.8.4
-
cpe:2.3:a:openvswitch:openvswitch:2.8.5
-
cpe:2.3:a:openvswitch:openvswitch:2.8.6
-
cpe:2.3:a:openvswitch:openvswitch:2.8.7
-
cpe:2.3:a:openvswitch:openvswitch:2.8.8
-
cpe:2.3:a:openvswitch:openvswitch:2.8.9
-
cpe:2.3:a:openvswitch:openvswitch:2.9.0
-
cpe:2.3:a:openvswitch:openvswitch:2.9.1
-
cpe:2.3:a:openvswitch:openvswitch:2.9.2
-
cpe:2.3:a:openvswitch:openvswitch:2.9.3
-
cpe:2.3:a:openvswitch:openvswitch:2.9.4
-
cpe:2.3:a:openvswitch:openvswitch:2.9.5
-
cpe:2.3:a:openvswitch:openvswitch:2.9.6
-
cpe:2.3:a:openvswitch:openvswitch:2.9.7
-
cpe:2.3:a:openvswitch:openvswitch:2.9.8
-
cpe:2.3:o:debian:debian_linux:10.0
-
cpe:2.3:o:debian:debian_linux:9.0
-
cpe:2.3:o:fedoraproject:fedora:33