var-202103-0218
Vulnerability from variot
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. Open vSwitch Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state. Canonical Ubuntu is a set of desktop application-based GNU/Linux operating system developed by British company Canonical. A security vulnerability exists in the Ubuntu lldp software that could be exploited by an attacker to trigger a denial of service attack. The following products and models are affected: Ubuntu 20.10 openvswitch-common, Ubuntu 20.04 LTS openvswitch-common Ubuntu 18.04 LTS openvswitch-common, Ubuntu 16.04 LTS: openvswitch-common. Two vulnerabilities were discovered in the LLPD implementation of Open vSwitch, a software-based Ethernet virtual switch, which could result in denial of service. For the stable distribution (buster), these problems have been fixed in version 2.10.6+ds1-0+deb10u1. For the detailed security status of openvswitch please refer to its security tracker page at: security-tracker.debian.org/tracker/openvswitch. Description:
Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.
Bug Fix(es):
-
[RFE] Add auto load balance params (BZ#1920121)
-
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: RHV-H enhancement and security update (redhat-virtualization-host) 4.3.14 Advisory ID: RHSA-2021:1051-01 Product: Red Hat Virtualization Advisory URL: https://access.redhat.com/errata/RHSA-2021:1051 Issue date: 2021-03-31 CVE Names: CVE-2020-27827 ==================================================================== 1. Summary:
An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
RHEL 7-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64 Red Hat Virtualization 4 Hypervisor for RHEL 7 - noarch
- Description:
The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.
Security Fix(es):
- lldp/openvswitch: denial of service via externally triggered memory leak (CVE-2020-27827)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/2974891
- Bugs fixed (https://bugzilla.redhat.com/):
1921438 - CVE-2020-27827 lldp/openvswitch: denial of service via externally triggered memory leak 1924062 - Rebase RHV-H 4.3 EUS on RHEL 7.9.z #4 1932859 - Rebase RHV-H 4.3.14 on FDP 2.11 (21B) 1940841 - Include updated gluster-ansible-features in RHV-H 4.3
- Package List:
Red Hat Virtualization 4 Hypervisor for RHEL 7:
Source: redhat-virtualization-host-4.3.14-20210322.0.el7_9.src.rpm
noarch: redhat-virtualization-host-image-update-4.3.14-20210322.0.el7_9.noarch.rpm
RHEL 7-based RHEV-H for RHEV 4 (build requirements):
Source: redhat-release-virtualization-host-4.3.14-2.el7ev.src.rpm redhat-virtualization-host-4.3.14-20210322.0.el7_9.src.rpm
noarch: redhat-virtualization-host-image-update-4.3.14-20210322.0.el7_9.noarch.rpm redhat-virtualization-host-image-update-placeholder-4.3.14-2.el7ev.noarch.rpm
x86_64: redhat-release-virtualization-host-4.3.14-2.el7ev.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-27827 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYGRyJtzjgjWX9erEAQg/oA/+JnqagPDFgIbL7eSCpxsXkqodtCyXjbEp CMxp54Mwa8GdyaSpNvqnRUz4k1f/BVZPKqHv+wHRHy0xhFeUITHmwM9RhK/b+t4G zrnDYrNpeierd4IWeZNrR2XOYBMq1PLpEtDwxM9NlGD9FZuDPAWKghD8tvxV8FMY TC7PaGdi54cUHgbcHHxsJconfAsbQrE3mphksxXf7m8ZS4ffiGsXdQCnNB3TgsGn oDw6fv/wSh2SKN5Us6c3bJ3/yWwGP7B02TQtAB4+bTfb55u9N4oDIeaUYKkmnh91 pxUZJlrtqGBdfvnKg8isEn1f57fLAME6J7m80w6CoCXaK2LoSauyXTzlTpM4W6V+ Qr05ALxILsTTn3vpuLUqEmUAQYghqYeAkhioZx7vQ+5xTXJMLZCSDF+xFuOHSpGc J2vCym9kcRxSQY4QR9ae+EN/K2IdHYHNFocQTIpY/CrK2b9dNy8VlzPQrhiA6R4W eLmD7ZpYJiuHEIplRd/elzze0RdXsVujs3eyWOhLP8uynz0AykGmhIn2a/YX6P3b T8ZHfTig37BfvwZeezj/EgyHjftUBf43NNTqjdxYflI/tlw2Qw1JSUsHct+22GsG f5gA7dFoWmkmMoPRjjvcbFhHr50vwwUaRNdOJBo0rUEJT6ol+bZcJdxTS2vkmOC8 OSRA+4x+lwY=Z/AD -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202311-16
https://security.gentoo.org/
Severity: Low Title: Open vSwitch: Multiple Vulnerabilities Date: November 26, 2023 Bugs: #765346, #769995, #803107, #887561 ID: 202311-16
Synopsis
Multiple denial of service vulnerabilites have been found in Open vSwitch.
Background
Open vSwitch is a production quality multilayer virtual switch.
Affected packages
Package Vulnerable Unaffected
net-misc/openvswitch < 2.17.6 >= 2.17.6
Description
Multiple vulnerabilities have been discovered in Open vSwitch. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All Open vSwitch users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/openvswitch-2.17.6"
References
[ 1 ] CVE-2020-27827 https://nvd.nist.gov/vuln/detail/CVE-2020-27827 [ 2 ] CVE-2020-35498 https://nvd.nist.gov/vuln/detail/CVE-2020-35498 [ 3 ] CVE-2021-3905 https://nvd.nist.gov/vuln/detail/CVE-2021-3905 [ 4 ] CVE-2021-36980 https://nvd.nist.gov/vuln/detail/CVE-2021-36980 [ 5 ] CVE-2022-4337 https://nvd.nist.gov/vuln/detail/CVE-2022-4337 [ 6 ] CVE-2022-4338 https://nvd.nist.gov/vuln/detail/CVE-2022-4338 [ 7 ] CVE-2023-1668 https://nvd.nist.gov/vuln/detail/CVE-2023-1668
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202311-16
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202103-0218", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "virtualization", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8.0" }, { "model": "openvswitch", "scope": "gte", "trust": 1.0, "vendor": "openvswitch", "version": "2.12.0" }, { "model": "openvswitch", "scope": "gte", "trust": 1.0, "vendor": "openvswitch", "version": "2.11.0" }, { "model": "openvswitch", "scope": "lt", "trust": 1.0, "vendor": "openvswitch", "version": "2.6.9" }, { "model": "openvswitch", "scope": "gte", "trust": 1.0, "vendor": "openvswitch", "version": "2.8.0" }, { "model": "openvswitch", "scope": "gte", "trust": 1.0, "vendor": "openvswitch", "version": "2.6.0" }, { "model": "openvswitch", "scope": "gte", "trust": 1.0, "vendor": "openvswitch", "version": "2.9.0" }, { "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "10" }, { "model": "simatic net cp 1545-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "openvswitch", "scope": "lt", "trust": 1.0, "vendor": "openvswitch", "version": "2.11.5" }, { "model": "simatic net cp 1543-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "openvswitch", "scope": "gte", "trust": 1.0, "vendor": "openvswitch", "version": "2.10.0" }, { "model": "simatic net cp 1543sp-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic hmi unified comfort panels", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "17" }, { "model": "openshift container platform", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.0" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "13" }, { "model": "openvswitch", "scope": "gte", "trust": 1.0, "vendor": "openvswitch", "version": "2.14.0" }, { "model": "openvswitch", "scope": "lt", "trust": 1.0, "vendor": "openvswitch", "version": "2.14.1" }, { "model": "openvswitch", "scope": "lt", "trust": 1.0, "vendor": "openvswitch", "version": "2.10.6" }, { "model": "openvswitch", "scope": "lt", "trust": 1.0, "vendor": "openvswitch", "version": "2.12.2" }, { "model": "openvswitch", "scope": "lt", "trust": 1.0, "vendor": "openvswitch", "version": "2.13.2" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "tim 1531 irc", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.2" }, { "model": "openvswitch", "scope": "lt", "trust": 1.0, "vendor": "openvswitch", "version": "2.8.10" }, { "model": "openvswitch", "scope": "lt", "trust": 1.0, "vendor": "openvswitch", "version": "2.7.12" }, { "model": "openvswitch", "scope": "gte", "trust": 1.0, "vendor": "openvswitch", "version": "2.7.0" }, { "model": "openvswitch", "scope": "gte", "trust": 1.0, "vendor": "openvswitch", "version": "2.13.0" }, { "model": "simatic net cp 1542sp-1 irc", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "lldpd", "scope": "lt", "trust": 1.0, "vendor": "lldpd", "version": "1.0.8" }, { "model": "sinumerik one", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.0.1" }, { "model": "openvswitch", "scope": "lt", "trust": 1.0, "vendor": "openvswitch", "version": "2.9.8" }, { "model": "simatic net cp 1243-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic net cp 1243-8 irc", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic net cp 1542sp-1", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "lldpd", "scope": null, "trust": 0.8, "vendor": "lldpd", "version": null }, { "model": "red hat openstack", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "red hat enterprise linux", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "red hat openshift container platform", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "open vswitch", "scope": null, "trust": 0.8, "vendor": "open vswitch", "version": null }, { "model": "red hat virtualization", "scope": null, "trust": 0.8, "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8", "version": null }, { "model": "fedora", "scope": null, "trust": 0.8, "vendor": "fedora", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016396" }, { "db": "NVD", "id": "CVE-2020-27827" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "162733" }, { "db": "PACKETSTORM", "id": "161391" }, { "db": "PACKETSTORM", "id": "161789" }, { "db": "PACKETSTORM", "id": "162043" }, { "db": "PACKETSTORM", "id": "161785" }, { "db": "PACKETSTORM", "id": "161781" }, { "db": "CNNVD", "id": "CNNVD-202101-1127" } ], "trust": 1.2 }, "cve": "CVE-2020-27827", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2020-27827", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-371938", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-27827", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-27827", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-27827", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-27827", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202101-1127", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-371938", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-371938" }, { "db": "JVNDB", "id": "JVNDB-2020-016396" }, { "db": "CNNVD", "id": "CNNVD-202101-1127" }, { "db": "NVD", "id": "CVE-2020-27827" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability. Open vSwitch Is vulnerable to a resource exhaustion.Denial of service (DoS) It may be put into a state. Canonical Ubuntu is a set of desktop application-based GNU/Linux operating system developed by British company Canonical. A security vulnerability exists in the Ubuntu lldp software that could be exploited by an attacker to trigger a denial of service attack. The following products and models are affected: Ubuntu 20.10 openvswitch-common, Ubuntu 20.04 LTS openvswitch-common Ubuntu 18.04 LTS openvswitch-common, Ubuntu 16.04 LTS: openvswitch-common. Two vulnerabilities were discovered in the LLPD implementation of Open\nvSwitch, a software-based Ethernet virtual switch, which could result in\ndenial of service. \nFor the stable distribution (buster), these problems have been fixed in\nversion 2.10.6+ds1-0+deb10u1. \nFor the detailed security status of openvswitch please refer to\nits security tracker page at:\nsecurity-tracker.debian.org/tracker/openvswitch. Description:\n\nOpen vSwitch provides standard network bridging functions and support for\nthe OpenFlow protocol for remote per-flow control of traffic. \n\nBug Fix(es):\n\n* [RFE] Add auto load balance params (BZ#1920121)\n\n4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: RHV-H enhancement and security update (redhat-virtualization-host) 4.3.14\nAdvisory ID: RHSA-2021:1051-01\nProduct: Red Hat Virtualization\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:1051\nIssue date: 2021-03-31\nCVE Names: CVE-2020-27827\n====================================================================\n1. Summary:\n\nAn update for redhat-virtualization-host is now available for Red Hat\nVirtualization 4 for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRHEL 7-based RHEV-H for RHEV 4 (build requirements) - noarch, x86_64\nRed Hat Virtualization 4 Hypervisor for RHEL 7 - noarch\n\n3. Description:\n\nThe redhat-virtualization-host packages provide the Red Hat Virtualization\nHost. \nThese packages include redhat-release-virtualization-host. Red Hat\nVirtualization Hosts (RHVH) are installed using a special build of Red Hat\nEnterprise Linux with only the packages required to host virtual machines. \nRHVH\nfeatures a Cockpit user interface for monitoring the host\u0027s resources and\nperforming administrative tasks. \n\nSecurity Fix(es):\n\n* lldp/openvswitch: denial of service via externally triggered memory leak\n(CVE-2020-27827)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/2974891\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1921438 - CVE-2020-27827 lldp/openvswitch: denial of service via externally triggered memory leak\n1924062 - Rebase RHV-H 4.3 EUS on RHEL 7.9.z #4\n1932859 - Rebase RHV-H 4.3.14 on FDP 2.11 (21B)\n1940841 - Include updated gluster-ansible-features in RHV-H 4.3\n\n6. Package List:\n\nRed Hat Virtualization 4 Hypervisor for RHEL 7:\n\nSource:\nredhat-virtualization-host-4.3.14-20210322.0.el7_9.src.rpm\n\nnoarch:\nredhat-virtualization-host-image-update-4.3.14-20210322.0.el7_9.noarch.rpm\n\nRHEL 7-based RHEV-H for RHEV 4 (build requirements):\n\nSource:\nredhat-release-virtualization-host-4.3.14-2.el7ev.src.rpm\nredhat-virtualization-host-4.3.14-20210322.0.el7_9.src.rpm\n\nnoarch:\nredhat-virtualization-host-image-update-4.3.14-20210322.0.el7_9.noarch.rpm\nredhat-virtualization-host-image-update-placeholder-4.3.14-2.el7ev.noarch.rpm\n\nx86_64:\nredhat-release-virtualization-host-4.3.14-2.el7ev.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-27827\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBYGRyJtzjgjWX9erEAQg/oA/+JnqagPDFgIbL7eSCpxsXkqodtCyXjbEp\nCMxp54Mwa8GdyaSpNvqnRUz4k1f/BVZPKqHv+wHRHy0xhFeUITHmwM9RhK/b+t4G\nzrnDYrNpeierd4IWeZNrR2XOYBMq1PLpEtDwxM9NlGD9FZuDPAWKghD8tvxV8FMY\nTC7PaGdi54cUHgbcHHxsJconfAsbQrE3mphksxXf7m8ZS4ffiGsXdQCnNB3TgsGn\noDw6fv/wSh2SKN5Us6c3bJ3/yWwGP7B02TQtAB4+bTfb55u9N4oDIeaUYKkmnh91\npxUZJlrtqGBdfvnKg8isEn1f57fLAME6J7m80w6CoCXaK2LoSauyXTzlTpM4W6V+\nQr05ALxILsTTn3vpuLUqEmUAQYghqYeAkhioZx7vQ+5xTXJMLZCSDF+xFuOHSpGc\nJ2vCym9kcRxSQY4QR9ae+EN/K2IdHYHNFocQTIpY/CrK2b9dNy8VlzPQrhiA6R4W\neLmD7ZpYJiuHEIplRd/elzze0RdXsVujs3eyWOhLP8uynz0AykGmhIn2a/YX6P3b\nT8ZHfTig37BfvwZeezj/EgyHjftUBf43NNTqjdxYflI/tlw2Qw1JSUsHct+22GsG\nf5gA7dFoWmkmMoPRjjvcbFhHr50vwwUaRNdOJBo0rUEJT6ol+bZcJdxTS2vkmOC8\nOSRA+4x+lwY=Z/AD\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202311-16\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Low\n Title: Open vSwitch: Multiple Vulnerabilities\n Date: November 26, 2023\n Bugs: #765346, #769995, #803107, #887561\n ID: 202311-16\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n=======\nMultiple denial of service vulnerabilites have been found in Open\nvSwitch. \n\nBackground\n=========\nOpen vSwitch is a production quality multilayer virtual switch. \n\nAffected packages\n================\nPackage Vulnerable Unaffected\n-------------------- ------------ ------------\nnet-misc/openvswitch \u003c 2.17.6 \u003e= 2.17.6\n\nDescription\n==========\nMultiple vulnerabilities have been discovered in Open vSwitch. Please\nreview the CVE identifiers referenced below for details. \n\nImpact\n=====\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n=========\nThere is no known workaround at this time. \n\nResolution\n=========\nAll Open vSwitch users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/openvswitch-2.17.6\"\n\nReferences\n=========\n[ 1 ] CVE-2020-27827\n https://nvd.nist.gov/vuln/detail/CVE-2020-27827\n[ 2 ] CVE-2020-35498\n https://nvd.nist.gov/vuln/detail/CVE-2020-35498\n[ 3 ] CVE-2021-3905\n https://nvd.nist.gov/vuln/detail/CVE-2021-3905\n[ 4 ] CVE-2021-36980\n https://nvd.nist.gov/vuln/detail/CVE-2021-36980\n[ 5 ] CVE-2022-4337\n https://nvd.nist.gov/vuln/detail/CVE-2022-4337\n[ 6 ] CVE-2022-4338\n https://nvd.nist.gov/vuln/detail/CVE-2022-4338\n[ 7 ] CVE-2023-1668\n https://nvd.nist.gov/vuln/detail/CVE-2023-1668\n\nAvailability\n===========\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202311-16\n\nConcerns?\n========\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n======\nCopyright 2023 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2020-27827" }, { "db": "JVNDB", "id": "JVNDB-2020-016396" }, { "db": "VULHUB", "id": "VHN-371938" }, { "db": "VULMON", "id": "CVE-2020-27827" }, { "db": "PACKETSTORM", "id": "162733" }, { "db": "PACKETSTORM", "id": "161391" }, { "db": "PACKETSTORM", "id": "161789" }, { "db": "PACKETSTORM", "id": "162043" }, { "db": "PACKETSTORM", "id": "161785" }, { "db": "PACKETSTORM", "id": "161781" }, { "db": "PACKETSTORM", "id": "175917" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-27827", "trust": 3.3 }, { "db": "ICS CERT", "id": "ICSA-21-194-07", "trust": 2.5 }, { "db": "SIEMENS", "id": "SSA-941426", "trust": 1.7 }, { "db": "PACKETSTORM", "id": "162733", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "161781", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "161391", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "162043", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-016396", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "163180", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "161951", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "162017", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202101-1127", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.0274", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0907", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2023.2134", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0999", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0520", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2155", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0169", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1109", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0639", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1086", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2402", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0358", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1780", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021052513", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021062138", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "161789", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "161785", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "162044", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-371938", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-27827", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "175917", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-371938" }, { "db": "VULMON", "id": "CVE-2020-27827" }, { "db": "JVNDB", "id": "JVNDB-2020-016396" }, { "db": "PACKETSTORM", "id": "162733" }, { "db": "PACKETSTORM", "id": "161391" }, { "db": "PACKETSTORM", "id": "161789" }, { "db": "PACKETSTORM", "id": "162043" }, { "db": "PACKETSTORM", "id": "161785" }, { "db": "PACKETSTORM", "id": "161781" }, { "db": "PACKETSTORM", "id": "175917" }, { "db": "CNNVD", "id": "CNNVD-202101-1127" }, { "db": "NVD", "id": "CVE-2020-27827" } ] }, "id": "VAR-202103-0218", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-371938" } ], "trust": 0.7875 }, "last_update_date": "2024-09-19T21:53:25.693000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Externally\u00a0triggered\u00a0memory\u00a0leak. Red hat Red\u00a0Hat\u00a0Bugzilla", "trust": 0.8, "url": "https://getfedora.org/ja/" }, { "title": "Canonical Ubuntu lldp Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=139475" }, { "title": "Debian CVElist Bug Report Logs: openvswitch: CVE-2020-27827", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=6e19c1cee1c2d0d3976ce8d1d62fbe23" }, { "title": "Debian Security Advisories: DSA-4836-1 openvswitch -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=4eb3ba5e3f5ae90d7aae6bc224bc63b7" }, { "title": "Arch Linux Advisories: [ASA-202101-29] lldpd: information disclosure", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202101-29" }, { "title": "Arch Linux Advisories: [ASA-202101-28] openvswitch: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202101-28" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2020-27827 log" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-27827" }, { "db": "JVNDB", "id": "JVNDB-2020-016396" }, { "db": "CNNVD", "id": "CNNVD-202101-1127" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [ Other ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-371938" }, { "db": "JVNDB", "id": "JVNDB-2020-016396" }, { "db": "NVD", "id": "CVE-2020-27827" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-194-07" }, { "trust": 2.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27827" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-941426.pdf" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921438" }, { "trust": 1.7, "url": "https://mail.openvswitch.org/pipermail/ovs-dev/2021-january/379471.html" }, { "trust": 1.1, "url": "https://security.gentoo.org/glsa/202311-16" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3t5xhpogipwcrrpjue6p3hvc5ptsd5js/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/jya4amjxcnf6upfg36l2tppt32c242sp/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/skqwhg2szjzsgc7pxvdaejybn7esdr7d/" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2020-27827" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-35498" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.6, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3t5xhpogipwcrrpjue6p3hvc5ptsd5js/" }, { "trust": 0.6, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/skqwhg2szjzsgc7pxvdaejybn7esdr7d/" }, { "trust": 0.6, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/jya4amjxcnf6upfg36l2tppt32c242sp/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/162733/red-hat-security-advisory-2021-2077-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0639" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/161391/red-hat-security-advisory-2021-0497-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0907" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021052513" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0169/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0358/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2402" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/162017/red-hat-security-advisory-2021-0957-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/161781/red-hat-security-advisory-2021-0834-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0999" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1109" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.2134" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2155" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1780" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0274/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/161951/red-hat-security-advisory-2021-0976-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1086" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/lldp-memory-leak-34341" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0520" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021062138" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/162043/red-hat-security-advisory-2021-1051-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163180/red-hat-security-advisory-2021-2456-01.html" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2020-35498" }, { "trust": 0.5, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.5, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.5, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980132" }, { "trust": 0.1, "url": "https://www.debian.org/security/2021/dsa-4836" }, { "trust": 0.1, "url": "https://security.archlinux.org/cve-2020-27827" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8011" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-8011" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2077" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification#important" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0497" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0835" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/2974891" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:1051" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0837" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:0834" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3905" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-4337" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-4338" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-1668" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36980" } ], "sources": [ { "db": "VULHUB", "id": "VHN-371938" }, { "db": "VULMON", "id": "CVE-2020-27827" }, { "db": "JVNDB", "id": "JVNDB-2020-016396" }, { "db": "PACKETSTORM", "id": "162733" }, { "db": "PACKETSTORM", "id": "161391" }, { "db": "PACKETSTORM", "id": "161789" }, { "db": "PACKETSTORM", "id": "162043" }, { "db": "PACKETSTORM", "id": "161785" }, { "db": "PACKETSTORM", "id": "161781" }, { "db": "PACKETSTORM", "id": "175917" }, { "db": "CNNVD", "id": "CNNVD-202101-1127" }, { "db": "NVD", "id": "CVE-2020-27827" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-371938" }, { "db": "VULMON", "id": "CVE-2020-27827" }, { "db": "JVNDB", "id": "JVNDB-2020-016396" }, { "db": "PACKETSTORM", "id": "162733" }, { "db": "PACKETSTORM", "id": "161391" }, { "db": "PACKETSTORM", "id": "161789" }, { "db": "PACKETSTORM", "id": "162043" }, { "db": "PACKETSTORM", "id": "161785" }, { "db": "PACKETSTORM", "id": "161781" }, { "db": "PACKETSTORM", "id": "175917" }, { "db": "CNNVD", "id": "CNNVD-202101-1127" }, { "db": "NVD", "id": "CVE-2020-27827" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-18T00:00:00", "db": "VULHUB", "id": "VHN-371938" }, { "date": "2021-03-18T00:00:00", "db": "VULMON", "id": "CVE-2020-27827" }, { "date": "2021-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016396" }, { "date": "2021-05-20T22:17:24", "db": "PACKETSTORM", "id": "162733" }, { "date": "2021-02-11T15:26:10", "db": "PACKETSTORM", "id": "161391" }, { "date": "2021-03-15T20:30:52", "db": "PACKETSTORM", "id": "161789" }, { "date": "2021-03-31T14:36:16", "db": "PACKETSTORM", "id": "162043" }, { "date": "2021-03-15T19:01:34", "db": "PACKETSTORM", "id": "161785" }, { "date": "2021-03-15T17:26:06", "db": "PACKETSTORM", "id": "161781" }, { "date": "2023-11-27T15:42:18", "db": "PACKETSTORM", "id": "175917" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1127" }, { "date": "2021-03-18T17:15:13.510000", "db": "NVD", "id": "CVE-2020-27827" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-07T00:00:00", "db": "VULHUB", "id": "VHN-371938" }, { "date": "2021-03-29T00:00:00", "db": "VULMON", "id": "CVE-2020-27827" }, { "date": "2021-11-30T06:47:00", "db": "JVNDB", "id": "JVNDB-2020-016396" }, { "date": "2023-04-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1127" }, { "date": "2023-11-26T11:15:07.307000", "db": "NVD", "id": "CVE-2020-27827" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "162733" }, { "db": "PACKETSTORM", "id": "161391" }, { "db": "PACKETSTORM", "id": "161789" }, { "db": "PACKETSTORM", "id": "161785" }, { "db": "PACKETSTORM", "id": "161781" }, { "db": "CNNVD", "id": "CNNVD-202101-1127" } ], "trust": 1.1 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Open\u00a0vSwitch\u00a0 Resource Depletion Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016396" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1127" } ], "trust": 0.6 } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.