First published: Wed Jun 16 2021(Updated: )
Open vSwitch provides standard network bridging functions and support for<br>the OpenFlow protocol for remote per-flow control of traffic.<br>Security Fix(es):<br><li> limitation in the OVS packet parsing in userspace leads to DoS</li> (CVE-2020-35498)<br><li> denial of service via externally triggered memory leak (CVE-2020-27827)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openvswitch2.11 | <2.11.3-86.el7fd | 2.11.3-86.el7fd |
redhat/openvswitch2.11-debuginfo | <2.11.3-86.el7fd | 2.11.3-86.el7fd |
redhat/openvswitch2.11-devel | <2.11.3-86.el7fd | 2.11.3-86.el7fd |
redhat/openvswitch2.11-test | <2.11.3-86.el7fd | 2.11.3-86.el7fd |
redhat/python-openvswitch2.11 | <2.11.3-86.el7fd | 2.11.3-86.el7fd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:2456 is classified as important due to the denial of service vulnerability it addresses.
To fix RHSA-2021:2456, update the affected Open vSwitch packages to version 2.11.3-86.el7fd or later.
RHSA-2021:2456 addresses a denial of service vulnerability in Open vSwitch due to limitations in packet parsing.
The affected packages include openvswitch2.11, openvswitch2.11-debuginfo, openvswitch2.11-devel, openvswitch2.11-test, and python-openvswitch2.11.
Yes, the associated CVE for RHSA-2021:2456 is CVE-2020-35498.