Back to bug 2135242
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Avinash Hanwate | 2022-10-17 06:49:55 UTC | Depends On | 2135243 | |
| Avinash Hanwate | 2022-10-17 06:52:52 UTC | CC | apevec, chrisw, ctrautma, echaudro, eglynn, fleitner, jhsiao, jjoyce, lhh, mburns, mgarciac, ovs-qe, ovs-team, ralongi, rkhan, spower | |
| Anten Skrabec | 2022-10-19 18:28:26 UTC | Depends On | 2136260, 2136257, 2136251, 2136258, 2136254, 2136255, 2136261, 2136256, 2136253, 2136262, 2136252, 2136259 | |
| Anten Skrabec | 2022-11-07 20:56:08 UTC | CC | jburrell, vkumar | |
| Doc Text | The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack. | |||
| Paige Jung | 2022-11-07 22:09:42 UTC | Doc Text | The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack. | A flaw was found in the Tuple Space Search (TSS) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0. This issue allows remote attackers to cause a denial of service via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache (Tuple Space Explosion (TSE) attack). |
| Red Hat Bugzilla | 2023-07-07 08:35:31 UTC | Assignee | security-response-team | nobody |
Back to bug 2135242