ID

VAR-202102-0421


CVE

CVE-2020-35498


TITLE

Openvswitch Resource Management Error Vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202102-1013

DESCRIPTION

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. Bug Fix(es): * [RFE] Add auto load balance params (BZ#1920121) 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: openvswitch2.11 security update Advisory ID: RHSA-2021:1050-01 Product: Red Hat Virtualization Advisory URL: https://access.redhat.com/errata/RHSA-2021:1050 Issue date: 2021-03-31 CVE Names: CVE-2020-27827 CVE-2020-35498 ==================================================================== 1. Summary: An update for openvswitch2.11 is now available in Red Hat Virtualization. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts - ppc64le, x86_64 3. Description: Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Security Fix(es): * openvswitch: limitation in the OVS packet parsing in userspace leads to DoS (CVE-2020-35498) * lldp/openvswitch: denial of service via externally triggered memory leak (CVE-2020-27827) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/2974891 5. Package List: Red Hat Virtualization 4 Management Agent for RHEL 7 Hosts: Source: openvswitch2.11-2.11.3-86.el7fdp.src.rpm ovn2.11-2.11.1-57.el7fdp.src.rpm ppc64le: openvswitch2.11-2.11.3-86.el7fdp.ppc64le.rpm openvswitch2.11-debuginfo-2.11.3-86.el7fdp.ppc64le.rpm openvswitch2.11-devel-2.11.3-86.el7fdp.ppc64le.rpm ovn2.11-2.11.1-57.el7fdp.ppc64le.rpm ovn2.11-debuginfo-2.11.1-57.el7fdp.ppc64le.rpm ovn2.11-host-2.11.1-57.el7fdp.ppc64le.rpm ovn2.11-vtep-2.11.1-57.el7fdp.ppc64le.rpm python-openvswitch2.11-2.11.3-86.el7fdp.ppc64le.rpm x86_64: openvswitch2.11-2.11.3-86.el7fdp.x86_64.rpm openvswitch2.11-debuginfo-2.11.3-86.el7fdp.x86_64.rpm openvswitch2.11-devel-2.11.3-86.el7fdp.x86_64.rpm ovn2.11-2.11.1-57.el7fdp.x86_64.rpm ovn2.11-debuginfo-2.11.1-57.el7fdp.x86_64.rpm ovn2.11-host-2.11.1-57.el7fdp.x86_64.rpm ovn2.11-vtep-2.11.1-57.el7fdp.x86_64.rpm python-openvswitch2.11-2.11.3-86.el7fdp.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-27827 https://access.redhat.com/security/cve/CVE-2020-35498 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYGRyQ9zjgjWX9erEAQhrShAAoeVmG1YdiiU+KFMdloJYVujUHAfasBEU Lh4XW/2T4R+kLbrG+cNu6Whm5JrNMNHxcr7VCBzBxMH2BdmhbBc+UhxEVIAmq9Kd BvOQykUW++052BkY4Iqm7q9viXkZNR4SK9fN2PKwK2yPezslta+AMQfnRhNzHU2a zv2uMt+198ALo/NriH4E5MFX4L8J7gvI+w1M6WsTXET9PJ3okANav+3E6gtwgheq gC0B3z7pzBDlSCIGXAi4lZjjtOd+jrZaxie6ltuQ0GPvEBLZXr+w8g9Q9SFhoBLE nN2UuWzhAq66rFPCan5YHn41AUNtwvfu5MAWOwk3KDFXznS9exXsBBQjN25y4jcO xl8cFSkJRghyJE1V5N2F52I9rTtqCysOyyLhoMWuNcYn7oU+rcQ/WAonrheYtZqk t+iRwOf04o9Zt9ns9Q5iHG5aQwXq0rB+HAeGfb0+4izqUF43HWj2pyxtaPq2jQfa iph0VN0x2M4ENXpjtO8vctu8Q1SKk0exiIou2d1EI0Dt4INZs67ewJyi1XoZP8Uu xRUWSPDMaWHKYCXzBkVD6nJQNmLT2usb4rfc3SkqG1Wjr2ieiiQC6k1Z/wi+RKfW lRK6WqHZTaAf0mG3QIjqmXa1IbF9CcGzoCtpfitPiWL0l2aewVSiDjXRsCVBorkX O5fT6yRvUC8=XI93 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-4729-1 February 10, 2021 openvswitch vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.10 - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS Summary: Open vSwitch could be made to crash or perform unexpectedly if it received specially crafted network traffic. Software Description: - openvswitch: Ethernet virtual switch Details: Joakim Hindersson discovered that Open vSwitch incorrectly parsed certain network packets. A remote attacker could use this issue to cause a denial of service, or possibly alter packet classification. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.10: openvswitch-common 2.13.1-0ubuntu1.3 Ubuntu 20.04 LTS: openvswitch-common 2.13.1-0ubuntu0.20.04.4 Ubuntu 18.04 LTS: openvswitch-common 2.9.8-0ubuntu0.18.04.2 Ubuntu 16.04 LTS: openvswitch-common 2.5.9-0ubuntu0.16.04.3 In general, a standard system update will make all the necessary changes. For the stable distribution (buster), this problem has been fixed in version 2.10.7+ds1-0+deb10u1. We recommend that you upgrade your openvswitch packages. For the detailed security status of openvswitch please refer to its security tracker page at: https://security-tracker.debian.org/tracker/openvswitch Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmAqZqIACgkQEL6Jg/PV nWSxAwf9Fs4AJekINCdGzSqrz3bBP3hpZj5otk9mVDcW6UC2yNcz+BUyxg81YB3m 0Fc8KGCaxp7bm5B3o/j8vzhs9JSBXdI9qZr72/5W7nWL5zqUdtptv4On4bChPq+6 MFn5Akaekkx/Fz25i33J859LHmn/8h9FXk/ADLRUdz+/iMintWG9mne39OXk8D3C 8Tp1zESGtitNbbq8YH7c4DsXA2kercBb22AqcE+2HClCaCGYaFi+xkLxwMpfbIVg E0WjhmeqWFZuLzRAwnKlL+MaQT19IlDMump95VZbJ7wzp4I0FSgWsAJ0JpFPu5xX btwIDA8LaoeZ7tnjYfQ/0bpx8dV9bA== =mPSj -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202311-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: Open vSwitch: Multiple Vulnerabilities Date: November 26, 2023 Bugs: #765346, #769995, #803107, #887561 ID: 202311-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple denial of service vulnerabilites have been found in Open vSwitch. Background ========= Open vSwitch is a production quality multilayer virtual switch. Affected packages ================ Package Vulnerable Unaffected -------------------- ------------ ------------ net-misc/openvswitch < 2.17.6 >= 2.17.6 Description ========== Multiple vulnerabilities have been discovered in Open vSwitch. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Open vSwitch users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/openvswitch-2.17.6" References ========= [ 1 ] CVE-2020-27827 https://nvd.nist.gov/vuln/detail/CVE-2020-27827 [ 2 ] CVE-2020-35498 https://nvd.nist.gov/vuln/detail/CVE-2020-35498 [ 3 ] CVE-2021-3905 https://nvd.nist.gov/vuln/detail/CVE-2021-3905 [ 4 ] CVE-2021-36980 https://nvd.nist.gov/vuln/detail/CVE-2021-36980 [ 5 ] CVE-2022-4337 https://nvd.nist.gov/vuln/detail/CVE-2022-4337 [ 6 ] CVE-2022-4338 https://nvd.nist.gov/vuln/detail/CVE-2022-4338 [ 7 ] CVE-2023-1668 https://nvd.nist.gov/vuln/detail/CVE-2023-1668 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202311-16 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5

Trust: 1.8

sources: NVD: CVE-2020-35498 // VULHUB: VHN-377694 // VULMON: CVE-2020-35498 // PACKETSTORM: 162733 // PACKETSTORM: 163180 // PACKETSTORM: 161391 // PACKETSTORM: 161785 // PACKETSTORM: 162044 // PACKETSTORM: 161369 // PACKETSTORM: 169010 // PACKETSTORM: 175917

AFFECTED PRODUCTS

vendor:openvswitchmodel:openvswitchscope:gteversion:2.5.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.8.11

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.12.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.11.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.8.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.6.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.9.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.14.2

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.10.7

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.11.6

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.9.9

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.10.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:33

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.7.13

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.14.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.7.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:gteversion:2.13.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.12.3

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.13.3

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.6.10

Trust: 1.0

vendor:openvswitchmodel:openvswitchscope:ltversion:2.5.12

Trust: 1.0

sources: NVD: CVE-2020-35498

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-35498
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202102-1013
value: HIGH

Trust: 0.6

VULHUB: VHN-377694
value: HIGH

Trust: 0.1

VULMON: CVE-2020-35498
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-35498
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-377694
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-35498
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-377694 // VULMON: CVE-2020-35498 // CNNVD: CNNVD-202102-1013 // NVD: CVE-2020-35498

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.1

sources: VULHUB: VHN-377694 // NVD: CVE-2020-35498

THREAT TYPE

remote

Trust: 1.2

sources: PACKETSTORM: 162733 // PACKETSTORM: 163180 // PACKETSTORM: 161391 // PACKETSTORM: 161785 // PACKETSTORM: 162044 // PACKETSTORM: 161369 // CNNVD: CNNVD-202102-1013

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202102-1013

PATCH

title:Openvswitch Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=141425

Trust: 0.6

title:Red Hat: Moderate: openvswitch2.13 security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20210497 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: openvswitch: CVE-2020-35498url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=a554431bcc9407eef1a141b6e575cb4e

Trust: 0.1

title:Debian Security Advisories: DSA-4852-1 openvswitch -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=c9bcacbfe71a4f464b907181265aa5c1

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-35498 log

Trust: 0.1

title:Citrix Security Bulletins: Citrix Hypervisor Security Updateurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=8e2fb4ccf2485f0ebad63c7a058cb7a3

Trust: 0.1

title:cve-2020-35498-flagurl:https://github.com/freddierice/cve-2020-35498-flag

Trust: 0.1

title:PoCurl:https://github.com/Jonathan-Elias/PoC

Trust: 0.1

title:PoC-in-GitHuburl:https://github.com/developer3000S/PoC-in-GitHub

Trust: 0.1

sources: VULMON: CVE-2020-35498 // CNNVD: CNNVD-202102-1013

EXTERNAL IDS

db:NVDid:CVE-2020-35498

Trust: 2.6

db:OPENWALLid:OSS-SECURITY/2021/02/10/4

Trust: 1.8

db:PACKETSTORMid:161369

Trust: 0.8

db:PACKETSTORMid:162733

Trust: 0.8

db:PACKETSTORMid:162044

Trust: 0.8

db:PACKETSTORMid:161781

Trust: 0.7

db:PACKETSTORMid:162017

Trust: 0.7

db:AUSCERTid:ESB-2021.1086

Trust: 0.6

db:AUSCERTid:ESB-2021.1780

Trust: 0.6

db:AUSCERTid:ESB-2021.1109

Trust: 0.6

db:AUSCERTid:ESB-2021.0639

Trust: 0.6

db:AUSCERTid:ESB-2021.0558

Trust: 0.6

db:AUSCERTid:ESB-2021.0907

Trust: 0.6

db:CS-HELPid:SB2021052513

Trust: 0.6

db:CNNVDid:CNNVD-202102-1013

Trust: 0.6

db:PACKETSTORMid:163180

Trust: 0.2

db:PACKETSTORMid:161391

Trust: 0.2

db:PACKETSTORMid:161785

Trust: 0.2

db:PACKETSTORMid:161789

Trust: 0.1

db:VULHUBid:VHN-377694

Trust: 0.1

db:VULMONid:CVE-2020-35498

Trust: 0.1

db:PACKETSTORMid:169010

Trust: 0.1

db:PACKETSTORMid:175917

Trust: 0.1

sources: VULHUB: VHN-377694 // VULMON: CVE-2020-35498 // PACKETSTORM: 162733 // PACKETSTORM: 163180 // PACKETSTORM: 161391 // PACKETSTORM: 161785 // PACKETSTORM: 162044 // PACKETSTORM: 161369 // PACKETSTORM: 169010 // PACKETSTORM: 175917 // CNNVD: CNNVD-202102-1013 // NVD: CVE-2020-35498

REFERENCES

url:https://www.debian.org/security/2021/dsa-4852

Trust: 1.9

url:https://bugzilla.redhat.com/show_bug.cgi?id=1908845

Trust: 1.8

url:https://www.openwall.com/lists/oss-security/2021/02/10/4

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html

Trust: 1.8

url:https://access.redhat.com/security/cve/cve-2020-35498

Trust: 1.1

url:https://security.gentoo.org/glsa/202311-16

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/uj4dxfjwmz325eczxpzosk7boedjzhpr/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/uj4dxfjwmz325eczxpzosk7boedjzhpr/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-35498

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-27827

Trust: 0.6

url:https://packetstormsecurity.com/files/162733/red-hat-security-advisory-2021-2077-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0639

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0907

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021052513

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.0558

Trust: 0.6

url:https://packetstormsecurity.com/files/162017/red-hat-security-advisory-2021-0957-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/161781/red-hat-security-advisory-2021-0834-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1109

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1780

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1086

Trust: 0.6

url:https://vigilance.fr/vulnerability/open-vswitch-denial-of-service-via-ip-with-ethernet-padding-34548

Trust: 0.6

url:https://packetstormsecurity.com/files/161369/ubuntu-security-notice-usn-4729-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/162044/red-hat-security-advisory-2021-1050-01.html

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-27827

Trust: 0.5

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://access.redhat.com/errata/rhsa-2021:0497

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/400.html

Trust: 0.1

url:https://github.com/freddierice/cve-2020-35498-flag

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-8011

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2015-8011

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2077

Trust: 0.1

url:https://access.redhat.com/security/updates/classification#important

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:2456

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:0837

Trust: 0.1

url:https://access.redhat.com/articles/2974891

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:1050

Trust: 0.1

url:https://usn.ubuntu.com/4729-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvswitch/2.13.1-0ubuntu1.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvswitch/2.13.1-0ubuntu0.20.04.4

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvswitch/2.5.9-0ubuntu0.16.04.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openvswitch/2.9.8-0ubuntu0.18.04.2

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://security-tracker.debian.org/tracker/openvswitch

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3905

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4337

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-4338

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-1668

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-36980

Trust: 0.1

sources: VULHUB: VHN-377694 // VULMON: CVE-2020-35498 // PACKETSTORM: 162733 // PACKETSTORM: 163180 // PACKETSTORM: 161391 // PACKETSTORM: 161785 // PACKETSTORM: 162044 // PACKETSTORM: 161369 // PACKETSTORM: 169010 // PACKETSTORM: 175917 // CNNVD: CNNVD-202102-1013 // NVD: CVE-2020-35498

CREDITS

Red Hat

Trust: 1.1

sources: PACKETSTORM: 162733 // PACKETSTORM: 163180 // PACKETSTORM: 161391 // PACKETSTORM: 161785 // PACKETSTORM: 162044 // CNNVD: CNNVD-202102-1013

SOURCES

db:VULHUBid:VHN-377694
db:VULMONid:CVE-2020-35498
db:PACKETSTORMid:162733
db:PACKETSTORMid:163180
db:PACKETSTORMid:161391
db:PACKETSTORMid:161785
db:PACKETSTORMid:162044
db:PACKETSTORMid:161369
db:PACKETSTORMid:169010
db:PACKETSTORMid:175917
db:CNNVDid:CNNVD-202102-1013
db:NVDid:CVE-2020-35498

LAST UPDATE DATE

2024-09-17T21:14:02.926000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-377694date:2021-03-17T00:00:00
db:VULMONid:CVE-2020-35498date:2021-03-17T00:00:00
db:CNNVDid:CNNVD-202102-1013date:2021-05-26T00:00:00
db:NVDid:CVE-2020-35498date:2023-11-26T11:15:07.937

SOURCES RELEASE DATE

db:VULHUBid:VHN-377694date:2021-02-11T00:00:00
db:VULMONid:CVE-2020-35498date:2021-02-11T00:00:00
db:PACKETSTORMid:162733date:2021-05-20T22:17:24
db:PACKETSTORMid:163180date:2021-06-17T17:37:26
db:PACKETSTORMid:161391date:2021-02-11T15:26:10
db:PACKETSTORMid:161785date:2021-03-15T19:01:34
db:PACKETSTORMid:162044date:2021-03-31T14:36:24
db:PACKETSTORMid:161369date:2021-02-11T15:14:59
db:PACKETSTORMid:169010date:2021-02-28T20:12:00
db:PACKETSTORMid:175917date:2023-11-27T15:42:18
db:CNNVDid:CNNVD-202102-1013date:2021-02-10T00:00:00
db:NVDid:CVE-2020-35498date:2021-02-11T18:15:15.677