Hi Santiago,

I am on vacation with limited access to my emails, but you can find the
CoNEXT and relevant papers/presentations on my website between years
2018 and 2020.

https://cslev.vip/publications/?tgid=12&yr=&type=&usr=&auth=#tppubs

Use the Links label to get the download links to the materials
themselves.

AFAIK, there is no official remedy to this as the root cause stems from
the algorithm itself. However, "third-party solutions" (that might have
other side-effects), such as changing the expiration time for Megaflow
cache entries, or monitoring the datapath and removing certain entries
accordingly, or trying to optimize your flow rules can be an approach
as a remedy. 

Cheers,
levi

On Fri, 2024-12-20 at 14:39 -0300, Santiago Ruano Rincón via discuss
wrote:
> Dear Open vSwitch developers,
> 
> Reviewing some open issues in Debian I found openvswitch's CVE-2019-
> 25076:
> https://security-tracker.debian.org/tracker/CVE-2019-25076.
> Probably my search skills are not good today, but I have been unable
> to
> find any information about the status of this issue upstream.
> 
> Unfortunately, I don't have access to the paper published at CoNEXT
> '19
> / ACM, so I am probably missing some details. I understand though
> that
> the attack surface of this issue is quite limited, and its severity
> is
> not important.
> Under the risk of making a dumb question, may I ask you if there is a
> plan to fix/mitigate this?
> 
> Best regards,
> 
>  -- Santiago
> _______________________________________________
> discuss mailing list
> disc...@openvswitch.org
> https://mail.openvswitch.org/mailman/listinfo/ovs-discuss
_______________________________________________
discuss mailing list
disc...@openvswitch.org
https://mail.openvswitch.org/mailman/listinfo/ovs-discuss

Reply via email to