NA

CVE-2019-25076

Published: 08/09/2022 Updated: 13/09/2022
CVSS v3 Base Score: 5.8 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x up to and including 2.17.2 and 3.0.0 allows remote malicious users to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openvswitch openvswitch 3.0.0

openvswitch openvswitch

Vendor Advisories

Debian Bug report logs - #1021740 openvswitch: CVE-2019-25076 Package: src:openvswitch; Maintainer for src:openvswitch is Debian OpenStack <team+openstack@trackerdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Thu, 13 Oct 2022 19:21:04 UTC Severity: important Tags: security, upstream Reply ...