CVE-2026-5265
⚪ Do wiadomości
Błąd w obsłudze ICMP w ovn-controller pozwala na odczyt pamięci poza buforem pakietu.
CVSS
6.5
EPSS
0.1%
Exploit
none
Vendor
Opis źródłowy (NVD)
When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 6.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-24 13:16:21 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 19:16:24 UTC |
Referencje
- https://access.redhat.com/errata/RHSA-2026:11694 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2026:11695 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2026:11696 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2026:11698 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2026:11700 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2026:11701 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2026:11702 (secalert@redhat.com)
- https://access.redhat.com/security/cve/CVE-2026-5265 (secalert@redhat.com)
- https://bugzilla.redhat.com/show_bug.cgi?id=2453458 (secalert@redhat.com)
- http://www.openwall.com/lists/oss-security/2026/04/20/2 (af854a3a-2127-422b-91ae-364da2661108)
- http://www.openwall.com/lists/oss-security/2026/04/20/4 (af854a3a-2127-422b-91ae-364da2661108)