CVE-2026-5265
MEDIUMOvn: ovn: heap over-read in icmp error response generation - security issue
Title source: cnaDescription
When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.
References (11)
Scores
CVSS v3
6.5
EPSS
0.0009
EPSS Percentile
25.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-130
Status
published
Products (11)
Red Hat/Fast Datapath for Red Hat Enterprise Linux 8
0:21.12.0-145.el8fdp
Red Hat/Fast Datapath for Red Hat Enterprise Linux 8
0:23.06.4-30.el8fdp
Red Hat/Fast Datapath for Red Hat Enterprise Linux 9
0:23.06.4-30.el9fdp
Red Hat/Fast Datapath for Red Hat Enterprise Linux 9
0:23.09.6-16.el9fdp
Red Hat/Fast Datapath for Red Hat Enterprise Linux 9
0:24.03.7-82.el9fdp
Red Hat/Fast Datapath for Red Hat Enterprise Linux 9
0:25.03.2-100.el9fdp
Red Hat/Fast Datapath for Red Hat Enterprise Linux 9
0:25.09.2-103.el9fdp
Red Hat/Fast Datapath for RHEL 10
Red Hat/Fast Datapath for RHEL 7
Red Hat/Fast Datapath for RHEL 8
... and 1 more
Published
Apr 24, 2026
Tracked Since
Apr 24, 2026