低危 Open vSwitch Packet resource consumption

CVE编号

CVE-2020-35498

利用情况

POC 已公开

补丁情况

官方补丁

披露时间

2021-02-12
漏洞描述
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 openvswitch openvswitch * From
(including)
2.10.0
Up to
(excluding)
2.10.7
运行在以下环境
应用 openvswitch openvswitch * From
(including)
2.11.0
Up to
(excluding)
2.11.6
运行在以下环境
应用 openvswitch openvswitch * From
(including)
2.12.0
Up to
(excluding)
2.12.3
运行在以下环境
应用 openvswitch openvswitch * From
(including)
2.13.0
Up to
(excluding)
2.13.3
运行在以下环境
应用 openvswitch openvswitch * From
(including)
2.14.0
Up to
(excluding)
2.14.2
运行在以下环境
应用 openvswitch openvswitch * From
(including)
2.5.0
Up to
(excluding)
2.5.12
运行在以下环境
应用 openvswitch openvswitch * From
(including)
2.6.0
Up to
(excluding)
2.6.10
运行在以下环境
应用 openvswitch openvswitch * From
(including)
2.7.0
Up to
(excluding)
2.7.13
运行在以下环境
应用 openvswitch openvswitch * From
(including)
2.8.0
Up to
(excluding)
2.8.11
运行在以下环境
应用 openvswitch openvswitch * From
(including)
2.9.0
Up to
(excluding)
2.9.9
运行在以下环境
系统 alpine_3.13 openvswitch * Up to
(excluding)
2.12.3-r0
运行在以下环境
系统 alpine_3.14 openvswitch * Up to
(excluding)
2.12.3-r0
运行在以下环境
系统 alpine_3.15 openvswitch * Up to
(excluding)
2.12.3-r0
运行在以下环境
系统 alpine_3.16 openvswitch * Up to
(excluding)
2.12.3-r0
运行在以下环境
系统 alpine_3.17 openvswitch * Up to
(excluding)
2.12.3-r0
运行在以下环境
系统 alpine_3.18 openvswitch * Up to
(excluding)
2.12.3-r0
运行在以下环境
系统 alpine_3.19 openvswitch * Up to
(excluding)
2.12.3-r0
运行在以下环境
系统 debian_10 openvswitch * Up to
(excluding)
2.10.7+ds1-0+deb10u1
运行在以下环境
系统 debian_11 openvswitch * Up to
(excluding)
2.15.0~git20210104.def6eb1ea+dfsg1-5
运行在以下环境
系统 debian_12 openvswitch * Up to
(excluding)
2.15.0~git20210104.def6eb1ea+dfsg1-5
运行在以下环境
系统 debian_9 openvswitch * Up to
(excluding)
2.6.10-0+deb9u1
运行在以下环境
系统 opensuse_Leap_15.2 ovn * Up to
(excluding)
2.13.2-lp152.3.12.1
运行在以下环境
系统 suse_12_SP5 openvswitch * Up to
(excluding)
2.11.5-3.9.1
运行在以下环境
系统 ubuntu_16.04 openvswitch * Up to
(excluding)
2.5.9-0ubuntu0.16.04.3
运行在以下环境
系统 ubuntu_18.04 openvswitch * Up to
(excluding)
2.9.8-0ubuntu0.18.04.2
运行在以下环境
系统 ubuntu_20.04 openvswitch * Up to
(excluding)
2.13.1-0ubuntu0.20.04.4
阿里云评分
3.8
  • 攻击路径
    远程
  • 攻击复杂度
    容易
  • 权限要求
    无需权限
  • 影响范围
    有限影响
  • EXP成熟度
    POC 已公开
  • 补丁情况
    官方补丁
  • 数据保密性
    数据泄露
  • 数据完整性
    传输被破坏
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-400 未加控制的资源消耗(资源穷尽)
阿里云安全产品覆盖情况