CVE-2026-5367
🟡 Monitoruj
Błąd w OVN umożliwia zdalnemu atakującemu ujawnienie wrażliwych danych z pamięci.
CVSS
8.6
EPSS
0.1%
Exploit
none
Vendor
Opis źródłowy (NVD)
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.6 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-24 13:16:21 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 18:16:04 UTC |
Referencje
- https://access.redhat.com/errata/RHSA-2026:11694 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2026:11695 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2026:11696 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2026:11698 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2026:11700 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2026:11701 (secalert@redhat.com)
- https://access.redhat.com/errata/RHSA-2026:11702 (secalert@redhat.com)
- https://access.redhat.com/security/cve/CVE-2026-5367 (secalert@redhat.com)
- https://bugzilla.redhat.com/show_bug.cgi?id=2455863 (secalert@redhat.com)
- http://www.openwall.com/lists/oss-security/2026/04/20/3 (af854a3a-2127-422b-91ae-364da2661108)
- http://www.openwall.com/lists/oss-security/2026/04/20/5 (af854a3a-2127-422b-91ae-364da2661108)