This bug was fixed in the package openvswitch - 2.9.8-0ubuntu0.18.04.2
---------------
openvswitch (2.9.8-0ubuntu0.18.04.2) bionic-security; urgency=medium
* SECURITY UPDATE: packet parsing vulnerability
- debian/patches/CVE-2020-35498.patch: support extra padding length in
lib/conntrack.c, lib/dp-packet.h, lib/flow.c, tests/classifier.at.
- CVE-2020-35498
-- Marc Deslauriers <[email protected]> Thu, 28 Jan 2021
14:49:10 -0500
** Changed in: openvswitch (Ubuntu Bionic)
Status: Fix Committed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-35498
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912201
Title:
[SRU] openvswitch 2.9.8
To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1912201/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs