Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-5367 (GCVE-0-2026-5367)
Vulnerability from cvelistv5 – Published: 2026-04-24 12:25 – Updated: 2026-04-29 17:46- CWE-130 - Improper Handling of Length Parameter Inconsistency
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Red Hat | Fast Datapath for Red Hat Enterprise Linux 8 |
Unaffected:
0:21.12.0-145.el8fdp , < *
(rpm)
cpe:/o:redhat:enterprise_linux:8::fastdatapath |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2026-04-24T13:37:14.640Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2026/04/20/3"
},
{
"url": "http://www.openwall.com/lists/oss-security/2026/04/20/5"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-5367",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-24T16:58:51.939172Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-24T18:17:08.701Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn-2021",
"product": "Fast Datapath for Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:21.12.0-145.el8fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn23.06",
"product": "Fast Datapath for Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.06.4-30.el8fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn23.06",
"product": "Fast Datapath for Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.06.4-30.el9fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn23.09",
"product": "Fast Datapath for Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:23.09.6-16.el9fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn24.03",
"product": "Fast Datapath for Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:24.03.7-82.el9fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn25.03",
"product": "Fast Datapath for Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:25.03.2-100.el9fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn25.09",
"product": "Fast Datapath for Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:25.09.2-103.el9fdp",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn25.03",
"product": "Fast Datapath for RHEL 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn25.09",
"product": "Fast Datapath for RHEL 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn2.11",
"product": "Fast Datapath for RHEL 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn2.12",
"product": "Fast Datapath for RHEL 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn2.13",
"product": "Fast Datapath for RHEL 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn23.03",
"product": "Fast Datapath for RHEL 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn-2021",
"product": "Fast Datapath for RHEL 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
],
"defaultStatus": "affected",
"packageName": "ovn23.03",
"product": "Fast Datapath for RHEL 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "affected",
"packageName": "ovn22.06",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "affected",
"packageName": "ovn22.09",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "affected",
"packageName": "ovn22.12",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "affected",
"packageName": "ovn23.03",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "affected",
"packageName": "ovn23.06",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "affected",
"packageName": "ovn23.09",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "affected",
"packageName": "ovn24.03",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "affected",
"packageName": "ovn24.09",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
}
],
"datePublic": "2026-04-13T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker\u0027s virtual machine port."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Important"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-130",
"description": "Improper Handling of Length Parameter Inconsistency",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-29T17:46:56.589Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2026:11694",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:11694"
},
{
"name": "RHSA-2026:11695",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:11695"
},
{
"name": "RHSA-2026:11696",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:11696"
},
{
"name": "RHSA-2026:11698",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:11698"
},
{
"name": "RHSA-2026:11700",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:11700"
},
{
"name": "RHSA-2026:11701",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:11701"
},
{
"name": "RHSA-2026:11702",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2026:11702"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2026-5367"
},
{
"name": "RHBZ#2455863",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
}
],
"timeline": [
{
"lang": "en",
"time": "2026-04-07T08:10:53.507Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2026-04-13T00:00:00.000Z",
"value": "Made public."
}
],
"title": "Ovn: ovn: information disclosure via crafted dhcpv6 packets",
"workarounds": [
{
"lang": "en",
"value": "The only potential mitigation is to disable the DHCPv6 feature for\nworkloads attached to OVN logical ports, e.g.:\n\novn-nbctl clear logical_switch_port \u003cworkload-port\u003e dhcpv6_options.\n\nWe do not recommend mitigating the vulnerability this way because it\nwill also disable legitimate DHCPv6 traffic originating from\nworkloads connected to logical switch ports."
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
},
"x_redhatCweChain": "CWE-130: Improper Handling of Length Parameter Inconsistency"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2026-5367",
"datePublished": "2026-04-24T12:25:05.024Z",
"dateReserved": "2026-04-01T18:39:05.229Z",
"dateUpdated": "2026-04-29T17:46:56.589Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-5367",
"date": "2026-05-04",
"epss": "0.0006",
"percentile": "0.18334"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-5367\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2026-04-24T13:16:21.990\",\"lastModified\":\"2026-04-29T18:16:04.980\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker\u0027s virtual machine port.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-130\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2026:11694\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:11695\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:11696\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:11698\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:11700\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:11701\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2026:11702\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2026-5367\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2455863\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/04/20/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2026/04/20/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2026/04/20/3\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2026/04/20/5\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2026-04-24T13:37:14.640Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-5367\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-24T16:58:51.939172Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-24T16:58:56.750Z\"}}], \"cna\": {\"title\": \"Ovn: ovn: information disclosure via crafted dhcpv6 packets\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Important\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:21.12.0-145.el8fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn-2021\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:23.06.4-30.el8fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn23.06\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:23.06.4-30.el9fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn23.06\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:23.09.6-16.el9fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn23.09\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:24.03.7-82.el9fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn24.03\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:25.03.2-100.el9fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn25.03\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:25.09.2-103.el9fdp\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"ovn25.09\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 10\", \"packageName\": \"ovn25.03\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 10\", \"packageName\": \"ovn25.09\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 8\", \"packageName\": \"ovn2.11\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 8\", \"packageName\": \"ovn2.12\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 8\", \"packageName\": \"ovn2.13\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:8::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 8\", \"packageName\": \"ovn23.03\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 9\", \"packageName\": \"ovn-2021\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::fastdatapath\"], \"vendor\": \"Red Hat\", \"product\": \"Fast Datapath for RHEL 9\", \"packageName\": \"ovn23.03\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"ovn22.06\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"ovn22.09\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"ovn22.12\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"ovn23.03\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"ovn23.06\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"ovn23.09\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"ovn24.03\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"ovn24.09\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-04-07T08:10:53.507Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2026-04-13T00:00:00.000Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2026-04-13T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2026:11694\", \"name\": \"RHSA-2026:11694\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:11695\", \"name\": \"RHSA-2026:11695\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:11696\", \"name\": \"RHSA-2026:11696\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:11698\", \"name\": \"RHSA-2026:11698\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:11700\", \"name\": \"RHSA-2026:11700\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:11701\", \"name\": \"RHSA-2026:11701\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2026:11702\", \"name\": \"RHSA-2026:11702\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2026-5367\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2455863\", \"name\": \"RHBZ#2455863\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"The only potential mitigation is to disable the DHCPv6 feature for\\nworkloads attached to OVN logical ports, e.g.:\\n\\novn-nbctl clear logical_switch_port \u003cworkload-port\u003e dhcpv6_options.\\n\\nWe do not recommend mitigating the vulnerability this way because it\\nwill also disable legitimate DHCPv6 traffic originating from\\nworkloads connected to logical switch ports.\"}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker\u0027s virtual machine port.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-130\", \"description\": \"Improper Handling of Length Parameter Inconsistency\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2026-04-29T17:46:56.589Z\"}, \"x_redhatCweChain\": \"CWE-130: Improper Handling of Length Parameter Inconsistency\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-5367\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-29T17:46:56.589Z\", \"dateReserved\": \"2026-04-01T18:39:05.229Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2026-04-24T12:25:05.024Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
RHSA-2026:11702
Vulnerability from csaf_redhat - Published: 2026-04-29 12:45 - Updated: 2026-04-29 18:27When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn25.09 is now available for Fast Datapath for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups.\n\nSecurity Fix(es):\n\n* ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue (CVE-2026-5265)\n\n* ovn: OVN: Information disclosure via crafted DHCPv6 packets (CVE-2026-5367)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11702",
"url": "https://access.redhat.com/errata/RHSA-2026:11702"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "FDP-3258",
"url": "https://issues.redhat.com/browse/FDP-3258"
},
{
"category": "external",
"summary": "FDP-3259",
"url": "https://issues.redhat.com/browse/FDP-3259"
},
{
"category": "external",
"summary": "FDP-3485",
"url": "https://issues.redhat.com/browse/FDP-3485"
},
{
"category": "external",
"summary": "FDP-3501",
"url": "https://issues.redhat.com/browse/FDP-3501"
},
{
"category": "external",
"summary": "FDP-3538",
"url": "https://issues.redhat.com/browse/FDP-3538"
},
{
"category": "external",
"summary": "FDP-3602",
"url": "https://issues.redhat.com/browse/FDP-3602"
},
{
"category": "external",
"summary": "FDP-3698",
"url": "https://issues.redhat.com/browse/FDP-3698"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11702.json"
}
],
"title": "Red Hat Security Advisory: ovn25.09 security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:21+00:00",
"generator": {
"date": "2026-04-29T18:27:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11702",
"initial_release_date": "2026-04-29T12:45:05+00:00",
"revision_history": [
{
"date": "2026-04-29T12:45:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T12:45:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn25.09-0:25.09.2-103.el9fdp.src",
"product": {
"name": "ovn25.09-0:25.09.2-103.el9fdp.src",
"product_id": "ovn25.09-0:25.09.2-103.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09@25.09.2-103.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn25.09-0:25.09.2-103.el9fdp.x86_64",
"product": {
"name": "ovn25.09-0:25.09.2-103.el9fdp.x86_64",
"product_id": "ovn25.09-0:25.09.2-103.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09@25.09.2-103.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-central-0:25.09.2-103.el9fdp.x86_64",
"product": {
"name": "ovn25.09-central-0:25.09.2-103.el9fdp.x86_64",
"product_id": "ovn25.09-central-0:25.09.2-103.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-central@25.09.2-103.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-host-0:25.09.2-103.el9fdp.x86_64",
"product": {
"name": "ovn25.09-host-0:25.09.2-103.el9fdp.x86_64",
"product_id": "ovn25.09-host-0:25.09.2-103.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-host@25.09.2-103.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64",
"product": {
"name": "ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64",
"product_id": "ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-vtep@25.09.2-103.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64",
"product": {
"name": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64",
"product_id": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-debugsource@25.09.2-103.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"product": {
"name": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"product_id": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-central-debuginfo@25.09.2-103.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"product": {
"name": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"product_id": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-debuginfo@25.09.2-103.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"product": {
"name": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"product_id": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-host-debuginfo@25.09.2-103.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"product": {
"name": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"product_id": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-vtep-debuginfo@25.09.2-103.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn25.09-0:25.09.2-103.el9fdp.ppc64le",
"product": {
"name": "ovn25.09-0:25.09.2-103.el9fdp.ppc64le",
"product_id": "ovn25.09-0:25.09.2-103.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09@25.09.2-103.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le",
"product": {
"name": "ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le",
"product_id": "ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-central@25.09.2-103.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le",
"product": {
"name": "ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le",
"product_id": "ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-host@25.09.2-103.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le",
"product": {
"name": "ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le",
"product_id": "ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-vtep@25.09.2-103.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le",
"product": {
"name": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le",
"product_id": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-debugsource@25.09.2-103.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"product": {
"name": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"product_id": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-central-debuginfo@25.09.2-103.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"product": {
"name": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"product_id": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-debuginfo@25.09.2-103.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"product": {
"name": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"product_id": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-host-debuginfo@25.09.2-103.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"product": {
"name": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"product_id": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-vtep-debuginfo@25.09.2-103.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn25.09-0:25.09.2-103.el9fdp.aarch64",
"product": {
"name": "ovn25.09-0:25.09.2-103.el9fdp.aarch64",
"product_id": "ovn25.09-0:25.09.2-103.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09@25.09.2-103.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-central-0:25.09.2-103.el9fdp.aarch64",
"product": {
"name": "ovn25.09-central-0:25.09.2-103.el9fdp.aarch64",
"product_id": "ovn25.09-central-0:25.09.2-103.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-central@25.09.2-103.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-host-0:25.09.2-103.el9fdp.aarch64",
"product": {
"name": "ovn25.09-host-0:25.09.2-103.el9fdp.aarch64",
"product_id": "ovn25.09-host-0:25.09.2-103.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-host@25.09.2-103.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64",
"product": {
"name": "ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64",
"product_id": "ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-vtep@25.09.2-103.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64",
"product": {
"name": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64",
"product_id": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-debugsource@25.09.2-103.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"product": {
"name": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"product_id": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-central-debuginfo@25.09.2-103.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"product": {
"name": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"product_id": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-debuginfo@25.09.2-103.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"product": {
"name": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"product_id": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-host-debuginfo@25.09.2-103.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"product": {
"name": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"product_id": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-vtep-debuginfo@25.09.2-103.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn25.09-0:25.09.2-103.el9fdp.s390x",
"product": {
"name": "ovn25.09-0:25.09.2-103.el9fdp.s390x",
"product_id": "ovn25.09-0:25.09.2-103.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09@25.09.2-103.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-central-0:25.09.2-103.el9fdp.s390x",
"product": {
"name": "ovn25.09-central-0:25.09.2-103.el9fdp.s390x",
"product_id": "ovn25.09-central-0:25.09.2-103.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-central@25.09.2-103.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-host-0:25.09.2-103.el9fdp.s390x",
"product": {
"name": "ovn25.09-host-0:25.09.2-103.el9fdp.s390x",
"product_id": "ovn25.09-host-0:25.09.2-103.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-host@25.09.2-103.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x",
"product": {
"name": "ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x",
"product_id": "ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-vtep@25.09.2-103.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x",
"product": {
"name": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x",
"product_id": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-debugsource@25.09.2-103.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x",
"product": {
"name": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x",
"product_id": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-central-debuginfo@25.09.2-103.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x",
"product": {
"name": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x",
"product_id": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-debuginfo@25.09.2-103.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x",
"product": {
"name": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x",
"product_id": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-host-debuginfo@25.09.2-103.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x",
"product": {
"name": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x",
"product_id": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.09-vtep-debuginfo@25.09.2-103.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-0:25.09.2-103.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.aarch64"
},
"product_reference": "ovn25.09-0:25.09.2-103.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-0:25.09.2-103.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.ppc64le"
},
"product_reference": "ovn25.09-0:25.09.2-103.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-0:25.09.2-103.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.s390x"
},
"product_reference": "ovn25.09-0:25.09.2-103.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-0:25.09.2-103.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.src"
},
"product_reference": "ovn25.09-0:25.09.2-103.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-0:25.09.2-103.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.x86_64"
},
"product_reference": "ovn25.09-0:25.09.2-103.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-central-0:25.09.2-103.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.aarch64"
},
"product_reference": "ovn25.09-central-0:25.09.2-103.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le"
},
"product_reference": "ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-central-0:25.09.2-103.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.s390x"
},
"product_reference": "ovn25.09-central-0:25.09.2-103.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-central-0:25.09.2-103.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.x86_64"
},
"product_reference": "ovn25.09-central-0:25.09.2-103.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64"
},
"product_reference": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le"
},
"product_reference": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x"
},
"product_reference": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64"
},
"product_reference": "ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64"
},
"product_reference": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le"
},
"product_reference": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x"
},
"product_reference": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64"
},
"product_reference": "ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64"
},
"product_reference": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le"
},
"product_reference": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x"
},
"product_reference": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64"
},
"product_reference": "ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-host-0:25.09.2-103.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.aarch64"
},
"product_reference": "ovn25.09-host-0:25.09.2-103.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le"
},
"product_reference": "ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-host-0:25.09.2-103.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.s390x"
},
"product_reference": "ovn25.09-host-0:25.09.2-103.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-host-0:25.09.2-103.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.x86_64"
},
"product_reference": "ovn25.09-host-0:25.09.2-103.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64"
},
"product_reference": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le"
},
"product_reference": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x"
},
"product_reference": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64"
},
"product_reference": "ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64"
},
"product_reference": "ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le"
},
"product_reference": "ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x"
},
"product_reference": "ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64"
},
"product_reference": "ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64"
},
"product_reference": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le"
},
"product_reference": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x"
},
"product_reference": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64"
},
"product_reference": "ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-5265",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453458"
}
],
"notes": [
{
"category": "description",
"text": "When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header\u0027s self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.src",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5265"
},
{
"category": "external",
"summary": "RHBZ#2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265"
}
],
"release_date": "2026-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:45:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.src",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11702"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.src",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.src",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue"
},
{
"cve": "CVE-2026-5367",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-04-07T08:10:53.507000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2455863"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker\u0027s virtual machine port.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: OVN: Information disclosure via crafted DHCPv6 packets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important information disclosure flaw exists in OVN (Open Virtual Network) where a remote attacker can send specially crafted DHCPv6 SOLICIT packets to the `ovn-controller`. This can lead to an out-of-bounds read, disclosing sensitive heap memory information back to the attacker\u0027s virtual machine port. This vulnerability affects OVN deployments where DHCPv6 is enabled for logical switch ports.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.src",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5367"
},
{
"category": "external",
"summary": "RHBZ#2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367"
}
],
"release_date": "2026-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:45:05+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.src",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11702"
},
{
"category": "workaround",
"details": "The only potential mitigation is to disable the DHCPv6 feature for\nworkloads attached to OVN logical ports, e.g.:\n\novn-nbctl clear logical_switch_port \u003cworkload-port\u003e dhcpv6_options.\n\nWe do not recommend mitigating the vulnerability this way because it\nwill also disable legitimate DHCPv6 traffic originating from\nworkloads connected to logical switch ports.",
"product_ids": [
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.src",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.src",
"9Base-Fast-Datapath:ovn25.09-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-central-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-debugsource-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-host-debuginfo-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-0:25.09.2-103.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.09-vtep-debuginfo-0:25.09.2-103.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ovn: OVN: Information disclosure via crafted DHCPv6 packets"
}
]
}
RHSA-2026:11700
Vulnerability from csaf_redhat - Published: 2026-04-29 12:45 - Updated: 2026-04-29 18:27When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn24.03 is now available for Fast Datapath for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups.\n\nSecurity Fix(es):\n\n* ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue (CVE-2026-5265)\n\n* ovn: OVN: Information disclosure via crafted DHCPv6 packets (CVE-2026-5367)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11700",
"url": "https://access.redhat.com/errata/RHSA-2026:11700"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "FDP-3265",
"url": "https://issues.redhat.com/browse/FDP-3265"
},
{
"category": "external",
"summary": "FDP-3490",
"url": "https://issues.redhat.com/browse/FDP-3490"
},
{
"category": "external",
"summary": "FDP-3497",
"url": "https://issues.redhat.com/browse/FDP-3497"
},
{
"category": "external",
"summary": "FDP-3695",
"url": "https://issues.redhat.com/browse/FDP-3695"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11700.json"
}
],
"title": "Red Hat Security Advisory: ovn24.03 security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:21+00:00",
"generator": {
"date": "2026-04-29T18:27:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11700",
"initial_release_date": "2026-04-29T12:45:25+00:00",
"revision_history": [
{
"date": "2026-04-29T12:45:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T12:45:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn24.03-0:24.03.7-82.el9fdp.src",
"product": {
"name": "ovn24.03-0:24.03.7-82.el9fdp.src",
"product_id": "ovn24.03-0:24.03.7-82.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03@24.03.7-82.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn24.03-0:24.03.7-82.el9fdp.x86_64",
"product": {
"name": "ovn24.03-0:24.03.7-82.el9fdp.x86_64",
"product_id": "ovn24.03-0:24.03.7-82.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03@24.03.7-82.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-central-0:24.03.7-82.el9fdp.x86_64",
"product": {
"name": "ovn24.03-central-0:24.03.7-82.el9fdp.x86_64",
"product_id": "ovn24.03-central-0:24.03.7-82.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-central@24.03.7-82.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-host-0:24.03.7-82.el9fdp.x86_64",
"product": {
"name": "ovn24.03-host-0:24.03.7-82.el9fdp.x86_64",
"product_id": "ovn24.03-host-0:24.03.7-82.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-host@24.03.7-82.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64",
"product": {
"name": "ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64",
"product_id": "ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-vtep@24.03.7-82.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64",
"product": {
"name": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64",
"product_id": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-debugsource@24.03.7-82.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"product": {
"name": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"product_id": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-central-debuginfo@24.03.7-82.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"product": {
"name": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"product_id": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-debuginfo@24.03.7-82.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"product": {
"name": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"product_id": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-host-debuginfo@24.03.7-82.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"product": {
"name": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"product_id": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-vtep-debuginfo@24.03.7-82.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn24.03-0:24.03.7-82.el9fdp.ppc64le",
"product": {
"name": "ovn24.03-0:24.03.7-82.el9fdp.ppc64le",
"product_id": "ovn24.03-0:24.03.7-82.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03@24.03.7-82.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le",
"product": {
"name": "ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le",
"product_id": "ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-central@24.03.7-82.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le",
"product": {
"name": "ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le",
"product_id": "ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-host@24.03.7-82.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le",
"product": {
"name": "ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le",
"product_id": "ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-vtep@24.03.7-82.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le",
"product": {
"name": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le",
"product_id": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-debugsource@24.03.7-82.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"product": {
"name": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"product_id": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-central-debuginfo@24.03.7-82.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"product": {
"name": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"product_id": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-debuginfo@24.03.7-82.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"product": {
"name": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"product_id": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-host-debuginfo@24.03.7-82.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"product": {
"name": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"product_id": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-vtep-debuginfo@24.03.7-82.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn24.03-0:24.03.7-82.el9fdp.aarch64",
"product": {
"name": "ovn24.03-0:24.03.7-82.el9fdp.aarch64",
"product_id": "ovn24.03-0:24.03.7-82.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03@24.03.7-82.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-central-0:24.03.7-82.el9fdp.aarch64",
"product": {
"name": "ovn24.03-central-0:24.03.7-82.el9fdp.aarch64",
"product_id": "ovn24.03-central-0:24.03.7-82.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-central@24.03.7-82.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-host-0:24.03.7-82.el9fdp.aarch64",
"product": {
"name": "ovn24.03-host-0:24.03.7-82.el9fdp.aarch64",
"product_id": "ovn24.03-host-0:24.03.7-82.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-host@24.03.7-82.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64",
"product": {
"name": "ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64",
"product_id": "ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-vtep@24.03.7-82.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64",
"product": {
"name": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64",
"product_id": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-debugsource@24.03.7-82.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"product": {
"name": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"product_id": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-central-debuginfo@24.03.7-82.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"product": {
"name": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"product_id": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-debuginfo@24.03.7-82.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"product": {
"name": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"product_id": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-host-debuginfo@24.03.7-82.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"product": {
"name": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"product_id": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-vtep-debuginfo@24.03.7-82.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn24.03-0:24.03.7-82.el9fdp.s390x",
"product": {
"name": "ovn24.03-0:24.03.7-82.el9fdp.s390x",
"product_id": "ovn24.03-0:24.03.7-82.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03@24.03.7-82.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-central-0:24.03.7-82.el9fdp.s390x",
"product": {
"name": "ovn24.03-central-0:24.03.7-82.el9fdp.s390x",
"product_id": "ovn24.03-central-0:24.03.7-82.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-central@24.03.7-82.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-host-0:24.03.7-82.el9fdp.s390x",
"product": {
"name": "ovn24.03-host-0:24.03.7-82.el9fdp.s390x",
"product_id": "ovn24.03-host-0:24.03.7-82.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-host@24.03.7-82.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x",
"product": {
"name": "ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x",
"product_id": "ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-vtep@24.03.7-82.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x",
"product": {
"name": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x",
"product_id": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-debugsource@24.03.7-82.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x",
"product": {
"name": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x",
"product_id": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-central-debuginfo@24.03.7-82.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x",
"product": {
"name": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x",
"product_id": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-debuginfo@24.03.7-82.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x",
"product": {
"name": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x",
"product_id": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-host-debuginfo@24.03.7-82.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x",
"product": {
"name": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x",
"product_id": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn24.03-vtep-debuginfo@24.03.7-82.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-0:24.03.7-82.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.aarch64"
},
"product_reference": "ovn24.03-0:24.03.7-82.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-0:24.03.7-82.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.ppc64le"
},
"product_reference": "ovn24.03-0:24.03.7-82.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-0:24.03.7-82.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.s390x"
},
"product_reference": "ovn24.03-0:24.03.7-82.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-0:24.03.7-82.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.src"
},
"product_reference": "ovn24.03-0:24.03.7-82.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-0:24.03.7-82.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.x86_64"
},
"product_reference": "ovn24.03-0:24.03.7-82.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-central-0:24.03.7-82.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.aarch64"
},
"product_reference": "ovn24.03-central-0:24.03.7-82.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le"
},
"product_reference": "ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-central-0:24.03.7-82.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.s390x"
},
"product_reference": "ovn24.03-central-0:24.03.7-82.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-central-0:24.03.7-82.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.x86_64"
},
"product_reference": "ovn24.03-central-0:24.03.7-82.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64"
},
"product_reference": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le"
},
"product_reference": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x"
},
"product_reference": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64"
},
"product_reference": "ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64"
},
"product_reference": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le"
},
"product_reference": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x"
},
"product_reference": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64"
},
"product_reference": "ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64"
},
"product_reference": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le"
},
"product_reference": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x"
},
"product_reference": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64"
},
"product_reference": "ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-host-0:24.03.7-82.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.aarch64"
},
"product_reference": "ovn24.03-host-0:24.03.7-82.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le"
},
"product_reference": "ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-host-0:24.03.7-82.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.s390x"
},
"product_reference": "ovn24.03-host-0:24.03.7-82.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-host-0:24.03.7-82.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.x86_64"
},
"product_reference": "ovn24.03-host-0:24.03.7-82.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64"
},
"product_reference": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le"
},
"product_reference": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x"
},
"product_reference": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64"
},
"product_reference": "ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64"
},
"product_reference": "ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le"
},
"product_reference": "ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x"
},
"product_reference": "ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64"
},
"product_reference": "ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64"
},
"product_reference": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le"
},
"product_reference": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x"
},
"product_reference": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64"
},
"product_reference": "ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-5265",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453458"
}
],
"notes": [
{
"category": "description",
"text": "When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header\u0027s self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.src",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5265"
},
{
"category": "external",
"summary": "RHBZ#2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265"
}
],
"release_date": "2026-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:45:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.src",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11700"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.src",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.src",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue"
},
{
"cve": "CVE-2026-5367",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-04-07T08:10:53.507000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2455863"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker\u0027s virtual machine port.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: OVN: Information disclosure via crafted DHCPv6 packets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important information disclosure flaw exists in OVN (Open Virtual Network) where a remote attacker can send specially crafted DHCPv6 SOLICIT packets to the `ovn-controller`. This can lead to an out-of-bounds read, disclosing sensitive heap memory information back to the attacker\u0027s virtual machine port. This vulnerability affects OVN deployments where DHCPv6 is enabled for logical switch ports.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.src",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5367"
},
{
"category": "external",
"summary": "RHBZ#2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367"
}
],
"release_date": "2026-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:45:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.src",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11700"
},
{
"category": "workaround",
"details": "The only potential mitigation is to disable the DHCPv6 feature for\nworkloads attached to OVN logical ports, e.g.:\n\novn-nbctl clear logical_switch_port \u003cworkload-port\u003e dhcpv6_options.\n\nWe do not recommend mitigating the vulnerability this way because it\nwill also disable legitimate DHCPv6 traffic originating from\nworkloads connected to logical switch ports.",
"product_ids": [
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.src",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.src",
"9Base-Fast-Datapath:ovn24.03-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-central-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-debugsource-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-host-debuginfo-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-0:24.03.7-82.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.s390x",
"9Base-Fast-Datapath:ovn24.03-vtep-debuginfo-0:24.03.7-82.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ovn: OVN: Information disclosure via crafted DHCPv6 packets"
}
]
}
RHSA-2026:11695
Vulnerability from csaf_redhat - Published: 2026-04-29 12:41 - Updated: 2026-04-29 18:27When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.06 is now available for Fast Datapath for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups.\n\nSecurity Fix(es):\n\n* ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue (CVE-2026-5265)\n\n* ovn: OVN: Information disclosure via crafted DHCPv6 packets (CVE-2026-5367)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11695",
"url": "https://access.redhat.com/errata/RHSA-2026:11695"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "FDP-3692",
"url": "https://issues.redhat.com/browse/FDP-3692"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11695.json"
}
],
"title": "Red Hat Security Advisory: ovn23.06 security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:19+00:00",
"generator": {
"date": "2026-04-29T18:27:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11695",
"initial_release_date": "2026-04-29T12:41:00+00:00",
"revision_history": [
{
"date": "2026-04-29T12:41:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T12:41:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.4-30.el8fdp.src",
"product": {
"name": "ovn23.06-0:23.06.4-30.el8fdp.src",
"product_id": "ovn23.06-0:23.06.4-30.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.4-30.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.4-30.el8fdp.x86_64",
"product": {
"name": "ovn23.06-0:23.06.4-30.el8fdp.x86_64",
"product_id": "ovn23.06-0:23.06.4-30.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.4-30.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.4-30.el8fdp.x86_64",
"product": {
"name": "ovn23.06-central-0:23.06.4-30.el8fdp.x86_64",
"product_id": "ovn23.06-central-0:23.06.4-30.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.4-30.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.4-30.el8fdp.x86_64",
"product": {
"name": "ovn23.06-host-0:23.06.4-30.el8fdp.x86_64",
"product_id": "ovn23.06-host-0:23.06.4-30.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.4-30.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64",
"product": {
"name": "ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64",
"product_id": "ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.4-30.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64",
"product": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64",
"product_id": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.4-30.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"product_id": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.4-30.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"product_id": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.4-30.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"product_id": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.4-30.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.4-30.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.4-30.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-0:23.06.4-30.el8fdp.ppc64le",
"product_id": "ovn23.06-0:23.06.4-30.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.4-30.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le",
"product_id": "ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.4-30.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le",
"product_id": "ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.4-30.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le",
"product_id": "ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.4-30.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le",
"product_id": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.4-30.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"product_id": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.4-30.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"product_id": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.4-30.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"product_id": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.4-30.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.4-30.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.4-30.el8fdp.aarch64",
"product": {
"name": "ovn23.06-0:23.06.4-30.el8fdp.aarch64",
"product_id": "ovn23.06-0:23.06.4-30.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.4-30.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.4-30.el8fdp.aarch64",
"product": {
"name": "ovn23.06-central-0:23.06.4-30.el8fdp.aarch64",
"product_id": "ovn23.06-central-0:23.06.4-30.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.4-30.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.4-30.el8fdp.aarch64",
"product": {
"name": "ovn23.06-host-0:23.06.4-30.el8fdp.aarch64",
"product_id": "ovn23.06-host-0:23.06.4-30.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.4-30.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64",
"product": {
"name": "ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64",
"product_id": "ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.4-30.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64",
"product": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64",
"product_id": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.4-30.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"product_id": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.4-30.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"product_id": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.4-30.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"product_id": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.4-30.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.4-30.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.4-30.el8fdp.s390x",
"product": {
"name": "ovn23.06-0:23.06.4-30.el8fdp.s390x",
"product_id": "ovn23.06-0:23.06.4-30.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.4-30.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.4-30.el8fdp.s390x",
"product": {
"name": "ovn23.06-central-0:23.06.4-30.el8fdp.s390x",
"product_id": "ovn23.06-central-0:23.06.4-30.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.4-30.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.4-30.el8fdp.s390x",
"product": {
"name": "ovn23.06-host-0:23.06.4-30.el8fdp.s390x",
"product_id": "ovn23.06-host-0:23.06.4-30.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.4-30.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x",
"product": {
"name": "ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x",
"product_id": "ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.4-30.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x",
"product": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x",
"product_id": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.4-30.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x",
"product_id": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.4-30.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x",
"product_id": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.4-30.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x",
"product_id": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.4-30.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.4-30.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.4-30.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.aarch64"
},
"product_reference": "ovn23.06-0:23.06.4-30.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.4-30.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-0:23.06.4-30.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.4-30.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.s390x"
},
"product_reference": "ovn23.06-0:23.06.4-30.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.4-30.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.src"
},
"product_reference": "ovn23.06-0:23.06.4-30.el8fdp.src",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.4-30.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.x86_64"
},
"product_reference": "ovn23.06-0:23.06.4-30.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.4-30.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.aarch64"
},
"product_reference": "ovn23.06-central-0:23.06.4-30.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.4-30.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.s390x"
},
"product_reference": "ovn23.06-central-0:23.06.4-30.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.4-30.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.x86_64"
},
"product_reference": "ovn23.06-central-0:23.06.4-30.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64"
},
"product_reference": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x"
},
"product_reference": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64"
},
"product_reference": "ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.4-30.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.aarch64"
},
"product_reference": "ovn23.06-host-0:23.06.4-30.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.4-30.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.s390x"
},
"product_reference": "ovn23.06-host-0:23.06.4-30.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.4-30.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.x86_64"
},
"product_reference": "ovn23.06-host-0:23.06.4-30.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64"
},
"product_reference": "ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x"
},
"product_reference": "ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64"
},
"product_reference": "ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-5265",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453458"
}
],
"notes": [
{
"category": "description",
"text": "When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header\u0027s self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5265"
},
{
"category": "external",
"summary": "RHBZ#2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265"
}
],
"release_date": "2026-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:41:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11695"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue"
},
{
"cve": "CVE-2026-5367",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-04-07T08:10:53.507000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2455863"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker\u0027s virtual machine port.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: OVN: Information disclosure via crafted DHCPv6 packets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important information disclosure flaw exists in OVN (Open Virtual Network) where a remote attacker can send specially crafted DHCPv6 SOLICIT packets to the `ovn-controller`. This can lead to an out-of-bounds read, disclosing sensitive heap memory information back to the attacker\u0027s virtual machine port. This vulnerability affects OVN deployments where DHCPv6 is enabled for logical switch ports.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5367"
},
{
"category": "external",
"summary": "RHBZ#2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367"
}
],
"release_date": "2026-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:41:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11695"
},
{
"category": "workaround",
"details": "The only potential mitigation is to disable the DHCPv6 feature for\nworkloads attached to OVN logical ports, e.g.:\n\novn-nbctl clear logical_switch_port \u003cworkload-port\u003e dhcpv6_options.\n\nWe do not recommend mitigating the vulnerability this way because it\nwill also disable legitimate DHCPv6 traffic originating from\nworkloads connected to logical switch ports.",
"product_ids": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.src",
"8Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.s390x",
"8Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ovn: OVN: Information disclosure via crafted DHCPv6 packets"
}
]
}
RHSA-2026:11701
Vulnerability from csaf_redhat - Published: 2026-04-29 12:44 - Updated: 2026-04-29 18:27When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn25.03 is now available for Fast Datapath for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups.\n\nSecurity Fix(es):\n\n* ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue (CVE-2026-5265)\n\n* ovn: OVN: Information disclosure via crafted DHCPv6 packets (CVE-2026-5367)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11701",
"url": "https://access.redhat.com/errata/RHSA-2026:11701"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "FDP-3262",
"url": "https://issues.redhat.com/browse/FDP-3262"
},
{
"category": "external",
"summary": "FDP-3487",
"url": "https://issues.redhat.com/browse/FDP-3487"
},
{
"category": "external",
"summary": "FDP-3499",
"url": "https://issues.redhat.com/browse/FDP-3499"
},
{
"category": "external",
"summary": "FDP-3540",
"url": "https://issues.redhat.com/browse/FDP-3540"
},
{
"category": "external",
"summary": "FDP-3696",
"url": "https://issues.redhat.com/browse/FDP-3696"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11701.json"
}
],
"title": "Red Hat Security Advisory: ovn25.03 security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:22+00:00",
"generator": {
"date": "2026-04-29T18:27:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11701",
"initial_release_date": "2026-04-29T12:44:55+00:00",
"revision_history": [
{
"date": "2026-04-29T12:44:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T12:44:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn25.03-0:25.03.2-100.el9fdp.src",
"product": {
"name": "ovn25.03-0:25.03.2-100.el9fdp.src",
"product_id": "ovn25.03-0:25.03.2-100.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03@25.03.2-100.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn25.03-0:25.03.2-100.el9fdp.x86_64",
"product": {
"name": "ovn25.03-0:25.03.2-100.el9fdp.x86_64",
"product_id": "ovn25.03-0:25.03.2-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03@25.03.2-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-central-0:25.03.2-100.el9fdp.x86_64",
"product": {
"name": "ovn25.03-central-0:25.03.2-100.el9fdp.x86_64",
"product_id": "ovn25.03-central-0:25.03.2-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-central@25.03.2-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-host-0:25.03.2-100.el9fdp.x86_64",
"product": {
"name": "ovn25.03-host-0:25.03.2-100.el9fdp.x86_64",
"product_id": "ovn25.03-host-0:25.03.2-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-host@25.03.2-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64",
"product": {
"name": "ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64",
"product_id": "ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-vtep@25.03.2-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64",
"product": {
"name": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64",
"product_id": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-debugsource@25.03.2-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"product": {
"name": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"product_id": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-central-debuginfo@25.03.2-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"product": {
"name": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"product_id": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-debuginfo@25.03.2-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"product": {
"name": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"product_id": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-host-debuginfo@25.03.2-100.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"product": {
"name": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"product_id": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-vtep-debuginfo@25.03.2-100.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn25.03-0:25.03.2-100.el9fdp.ppc64le",
"product": {
"name": "ovn25.03-0:25.03.2-100.el9fdp.ppc64le",
"product_id": "ovn25.03-0:25.03.2-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03@25.03.2-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le",
"product": {
"name": "ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le",
"product_id": "ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-central@25.03.2-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le",
"product": {
"name": "ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le",
"product_id": "ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-host@25.03.2-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le",
"product": {
"name": "ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le",
"product_id": "ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-vtep@25.03.2-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le",
"product": {
"name": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le",
"product_id": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-debugsource@25.03.2-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"product": {
"name": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"product_id": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-central-debuginfo@25.03.2-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"product": {
"name": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"product_id": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-debuginfo@25.03.2-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"product": {
"name": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"product_id": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-host-debuginfo@25.03.2-100.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"product": {
"name": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"product_id": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-vtep-debuginfo@25.03.2-100.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn25.03-0:25.03.2-100.el9fdp.aarch64",
"product": {
"name": "ovn25.03-0:25.03.2-100.el9fdp.aarch64",
"product_id": "ovn25.03-0:25.03.2-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03@25.03.2-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-central-0:25.03.2-100.el9fdp.aarch64",
"product": {
"name": "ovn25.03-central-0:25.03.2-100.el9fdp.aarch64",
"product_id": "ovn25.03-central-0:25.03.2-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-central@25.03.2-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-host-0:25.03.2-100.el9fdp.aarch64",
"product": {
"name": "ovn25.03-host-0:25.03.2-100.el9fdp.aarch64",
"product_id": "ovn25.03-host-0:25.03.2-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-host@25.03.2-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64",
"product": {
"name": "ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64",
"product_id": "ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-vtep@25.03.2-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64",
"product": {
"name": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64",
"product_id": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-debugsource@25.03.2-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"product": {
"name": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"product_id": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-central-debuginfo@25.03.2-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"product": {
"name": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"product_id": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-debuginfo@25.03.2-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"product": {
"name": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"product_id": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-host-debuginfo@25.03.2-100.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"product": {
"name": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"product_id": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-vtep-debuginfo@25.03.2-100.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn25.03-0:25.03.2-100.el9fdp.s390x",
"product": {
"name": "ovn25.03-0:25.03.2-100.el9fdp.s390x",
"product_id": "ovn25.03-0:25.03.2-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03@25.03.2-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-central-0:25.03.2-100.el9fdp.s390x",
"product": {
"name": "ovn25.03-central-0:25.03.2-100.el9fdp.s390x",
"product_id": "ovn25.03-central-0:25.03.2-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-central@25.03.2-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-host-0:25.03.2-100.el9fdp.s390x",
"product": {
"name": "ovn25.03-host-0:25.03.2-100.el9fdp.s390x",
"product_id": "ovn25.03-host-0:25.03.2-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-host@25.03.2-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x",
"product": {
"name": "ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x",
"product_id": "ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-vtep@25.03.2-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x",
"product": {
"name": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x",
"product_id": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-debugsource@25.03.2-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x",
"product": {
"name": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x",
"product_id": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-central-debuginfo@25.03.2-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x",
"product": {
"name": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x",
"product_id": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-debuginfo@25.03.2-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x",
"product": {
"name": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x",
"product_id": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-host-debuginfo@25.03.2-100.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x",
"product": {
"name": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x",
"product_id": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn25.03-vtep-debuginfo@25.03.2-100.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-0:25.03.2-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.aarch64"
},
"product_reference": "ovn25.03-0:25.03.2-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-0:25.03.2-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.ppc64le"
},
"product_reference": "ovn25.03-0:25.03.2-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-0:25.03.2-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.s390x"
},
"product_reference": "ovn25.03-0:25.03.2-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-0:25.03.2-100.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.src"
},
"product_reference": "ovn25.03-0:25.03.2-100.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-0:25.03.2-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.x86_64"
},
"product_reference": "ovn25.03-0:25.03.2-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-central-0:25.03.2-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.aarch64"
},
"product_reference": "ovn25.03-central-0:25.03.2-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le"
},
"product_reference": "ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-central-0:25.03.2-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.s390x"
},
"product_reference": "ovn25.03-central-0:25.03.2-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-central-0:25.03.2-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.x86_64"
},
"product_reference": "ovn25.03-central-0:25.03.2-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64"
},
"product_reference": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le"
},
"product_reference": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x"
},
"product_reference": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64"
},
"product_reference": "ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64"
},
"product_reference": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le"
},
"product_reference": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x"
},
"product_reference": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64"
},
"product_reference": "ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64"
},
"product_reference": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le"
},
"product_reference": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x"
},
"product_reference": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64"
},
"product_reference": "ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-host-0:25.03.2-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.aarch64"
},
"product_reference": "ovn25.03-host-0:25.03.2-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le"
},
"product_reference": "ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-host-0:25.03.2-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.s390x"
},
"product_reference": "ovn25.03-host-0:25.03.2-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-host-0:25.03.2-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.x86_64"
},
"product_reference": "ovn25.03-host-0:25.03.2-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64"
},
"product_reference": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le"
},
"product_reference": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x"
},
"product_reference": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64"
},
"product_reference": "ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64"
},
"product_reference": "ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le"
},
"product_reference": "ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x"
},
"product_reference": "ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64"
},
"product_reference": "ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64"
},
"product_reference": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le"
},
"product_reference": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x"
},
"product_reference": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64"
},
"product_reference": "ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-5265",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453458"
}
],
"notes": [
{
"category": "description",
"text": "When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header\u0027s self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.src",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5265"
},
{
"category": "external",
"summary": "RHBZ#2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265"
}
],
"release_date": "2026-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:44:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.src",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11701"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.src",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.src",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue"
},
{
"cve": "CVE-2026-5367",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-04-07T08:10:53.507000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2455863"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker\u0027s virtual machine port.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: OVN: Information disclosure via crafted DHCPv6 packets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important information disclosure flaw exists in OVN (Open Virtual Network) where a remote attacker can send specially crafted DHCPv6 SOLICIT packets to the `ovn-controller`. This can lead to an out-of-bounds read, disclosing sensitive heap memory information back to the attacker\u0027s virtual machine port. This vulnerability affects OVN deployments where DHCPv6 is enabled for logical switch ports.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.src",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5367"
},
{
"category": "external",
"summary": "RHBZ#2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367"
}
],
"release_date": "2026-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:44:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.src",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11701"
},
{
"category": "workaround",
"details": "The only potential mitigation is to disable the DHCPv6 feature for\nworkloads attached to OVN logical ports, e.g.:\n\novn-nbctl clear logical_switch_port \u003cworkload-port\u003e dhcpv6_options.\n\nWe do not recommend mitigating the vulnerability this way because it\nwill also disable legitimate DHCPv6 traffic originating from\nworkloads connected to logical switch ports.",
"product_ids": [
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.src",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.src",
"9Base-Fast-Datapath:ovn25.03-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-central-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-debugsource-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-host-debuginfo-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-0:25.03.2-100.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.s390x",
"9Base-Fast-Datapath:ovn25.03-vtep-debuginfo-0:25.03.2-100.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ovn: OVN: Information disclosure via crafted DHCPv6 packets"
}
]
}
RHSA-2026:11694
Vulnerability from csaf_redhat - Published: 2026-04-29 12:40 - Updated: 2026-04-29 18:27When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn-2021 is now available for Fast Datapath for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups.\n\nSecurity Fix(es):\n\n* ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue (CVE-2026-5265)\n\n* ovn: OVN: Information disclosure via crafted DHCPv6 packets (CVE-2026-5367)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11694",
"url": "https://access.redhat.com/errata/RHSA-2026:11694"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "FDP-3691",
"url": "https://issues.redhat.com/browse/FDP-3691"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11694.json"
}
],
"title": "Red Hat Security Advisory: ovn-2021 security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:19+00:00",
"generator": {
"date": "2026-04-29T18:27:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11694",
"initial_release_date": "2026-04-29T12:40:50+00:00",
"revision_history": [
{
"date": "2026-04-29T12:40:50+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T12:40:50+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-145.el8fdp.src",
"product": {
"name": "ovn-2021-0:21.12.0-145.el8fdp.src",
"product_id": "ovn-2021-0:21.12.0-145.el8fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-145.el8fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-145.el8fdp.x86_64",
"product": {
"name": "ovn-2021-0:21.12.0-145.el8fdp.x86_64",
"product_id": "ovn-2021-0:21.12.0-145.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-145.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-0:21.12.0-145.el8fdp.x86_64",
"product": {
"name": "ovn-2021-central-0:21.12.0-145.el8fdp.x86_64",
"product_id": "ovn-2021-central-0:21.12.0-145.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-145.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-0:21.12.0-145.el8fdp.x86_64",
"product": {
"name": "ovn-2021-host-0:21.12.0-145.el8fdp.x86_64",
"product_id": "ovn-2021-host-0:21.12.0-145.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-145.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64",
"product": {
"name": "ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64",
"product_id": "ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-145.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64",
"product": {
"name": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64",
"product_id": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-145.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"product": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"product_id": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-145.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"product": {
"name": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"product_id": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-145.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"product": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"product_id": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-145.el8fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"product": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-145.el8fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-145.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-0:21.12.0-145.el8fdp.ppc64le",
"product_id": "ovn-2021-0:21.12.0-145.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-145.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le",
"product_id": "ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-145.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le",
"product_id": "ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-145.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le",
"product_id": "ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-145.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le",
"product_id": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-145.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"product_id": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-145.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"product_id": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-145.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"product_id": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-145.el8fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"product": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-145.el8fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-145.el8fdp.aarch64",
"product": {
"name": "ovn-2021-0:21.12.0-145.el8fdp.aarch64",
"product_id": "ovn-2021-0:21.12.0-145.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-145.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-0:21.12.0-145.el8fdp.aarch64",
"product": {
"name": "ovn-2021-central-0:21.12.0-145.el8fdp.aarch64",
"product_id": "ovn-2021-central-0:21.12.0-145.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-145.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-0:21.12.0-145.el8fdp.aarch64",
"product": {
"name": "ovn-2021-host-0:21.12.0-145.el8fdp.aarch64",
"product_id": "ovn-2021-host-0:21.12.0-145.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-145.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64",
"product": {
"name": "ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64",
"product_id": "ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-145.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64",
"product": {
"name": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64",
"product_id": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-145.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"product": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"product_id": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-145.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"product": {
"name": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"product_id": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-145.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"product": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"product_id": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-145.el8fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"product": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-145.el8fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn-2021-0:21.12.0-145.el8fdp.s390x",
"product": {
"name": "ovn-2021-0:21.12.0-145.el8fdp.s390x",
"product_id": "ovn-2021-0:21.12.0-145.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021@21.12.0-145.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-0:21.12.0-145.el8fdp.s390x",
"product": {
"name": "ovn-2021-central-0:21.12.0-145.el8fdp.s390x",
"product_id": "ovn-2021-central-0:21.12.0-145.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central@21.12.0-145.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-0:21.12.0-145.el8fdp.s390x",
"product": {
"name": "ovn-2021-host-0:21.12.0-145.el8fdp.s390x",
"product_id": "ovn-2021-host-0:21.12.0-145.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host@21.12.0-145.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x",
"product": {
"name": "ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x",
"product_id": "ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep@21.12.0-145.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x",
"product": {
"name": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x",
"product_id": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debugsource@21.12.0-145.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x",
"product": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x",
"product_id": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-central-debuginfo@21.12.0-145.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x",
"product": {
"name": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x",
"product_id": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-debuginfo@21.12.0-145.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x",
"product": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x",
"product_id": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-host-debuginfo@21.12.0-145.el8fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x",
"product": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x",
"product_id": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn-2021-vtep-debuginfo@21.12.0-145.el8fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-145.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.aarch64"
},
"product_reference": "ovn-2021-0:21.12.0-145.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-145.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-0:21.12.0-145.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-145.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.s390x"
},
"product_reference": "ovn-2021-0:21.12.0-145.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-145.el8fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.src"
},
"product_reference": "ovn-2021-0:21.12.0-145.el8fdp.src",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-0:21.12.0-145.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.x86_64"
},
"product_reference": "ovn-2021-0:21.12.0-145.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-0:21.12.0-145.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.aarch64"
},
"product_reference": "ovn-2021-central-0:21.12.0-145.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-0:21.12.0-145.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.s390x"
},
"product_reference": "ovn-2021-central-0:21.12.0-145.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-0:21.12.0-145.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.x86_64"
},
"product_reference": "ovn-2021-central-0:21.12.0-145.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64"
},
"product_reference": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x"
},
"product_reference": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64"
},
"product_reference": "ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64"
},
"product_reference": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x"
},
"product_reference": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64"
},
"product_reference": "ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64"
},
"product_reference": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x"
},
"product_reference": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64"
},
"product_reference": "ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-0:21.12.0-145.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.aarch64"
},
"product_reference": "ovn-2021-host-0:21.12.0-145.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-0:21.12.0-145.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.s390x"
},
"product_reference": "ovn-2021-host-0:21.12.0-145.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-0:21.12.0-145.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.x86_64"
},
"product_reference": "ovn-2021-host-0:21.12.0-145.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64"
},
"product_reference": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x"
},
"product_reference": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64"
},
"product_reference": "ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64"
},
"product_reference": "ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x"
},
"product_reference": "ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64"
},
"product_reference": "ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64"
},
"product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le"
},
"product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x"
},
"product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x",
"relates_to_product_reference": "8Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 8",
"product_id": "8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64"
},
"product_reference": "ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"relates_to_product_reference": "8Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-5265",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453458"
}
],
"notes": [
{
"category": "description",
"text": "When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header\u0027s self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5265"
},
{
"category": "external",
"summary": "RHBZ#2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265"
}
],
"release_date": "2026-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:40:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11694"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue"
},
{
"cve": "CVE-2026-5367",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-04-07T08:10:53.507000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2455863"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker\u0027s virtual machine port.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: OVN: Information disclosure via crafted DHCPv6 packets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important information disclosure flaw exists in OVN (Open Virtual Network) where a remote attacker can send specially crafted DHCPv6 SOLICIT packets to the `ovn-controller`. This can lead to an out-of-bounds read, disclosing sensitive heap memory information back to the attacker\u0027s virtual machine port. This vulnerability affects OVN deployments where DHCPv6 is enabled for logical switch ports.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5367"
},
{
"category": "external",
"summary": "RHBZ#2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367"
}
],
"release_date": "2026-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:40:50+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11694"
},
{
"category": "workaround",
"details": "The only potential mitigation is to disable the DHCPv6 feature for\nworkloads attached to OVN logical ports, e.g.:\n\novn-nbctl clear logical_switch_port \u003cworkload-port\u003e dhcpv6_options.\n\nWe do not recommend mitigating the vulnerability this way because it\nwill also disable legitimate DHCPv6 traffic originating from\nworkloads connected to logical switch ports.",
"product_ids": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.src",
"8Base-Fast-Datapath:ovn-2021-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-central-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-debugsource-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-host-debuginfo-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-0:21.12.0-145.el8fdp.x86_64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.aarch64",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.ppc64le",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.s390x",
"8Base-Fast-Datapath:ovn-2021-vtep-debuginfo-0:21.12.0-145.el8fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ovn: OVN: Information disclosure via crafted DHCPv6 packets"
}
]
}
RHSA-2026:11698
Vulnerability from csaf_redhat - Published: 2026-04-29 12:42 - Updated: 2026-04-29 18:27When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.09 is now available for Fast Datapath for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups.\n\nSecurity Fix(es):\n\n* ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue (CVE-2026-5265)\n\n* ovn: OVN: Information disclosure via crafted DHCPv6 packets (CVE-2026-5367)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11698",
"url": "https://access.redhat.com/errata/RHSA-2026:11698"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "FDP-3739",
"url": "https://issues.redhat.com/browse/FDP-3739"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11698.json"
}
],
"title": "Red Hat Security Advisory: ovn23.09 security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:21+00:00",
"generator": {
"date": "2026-04-29T18:27:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11698",
"initial_release_date": "2026-04-29T12:42:46+00:00",
"revision_history": [
{
"date": "2026-04-29T12:42:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T12:42:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.6-16.el9fdp.src",
"product": {
"name": "ovn23.09-0:23.09.6-16.el9fdp.src",
"product_id": "ovn23.09-0:23.09.6-16.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.6-16.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.6-16.el9fdp.x86_64",
"product": {
"name": "ovn23.09-0:23.09.6-16.el9fdp.x86_64",
"product_id": "ovn23.09-0:23.09.6-16.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.6-16.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-0:23.09.6-16.el9fdp.x86_64",
"product": {
"name": "ovn23.09-central-0:23.09.6-16.el9fdp.x86_64",
"product_id": "ovn23.09-central-0:23.09.6-16.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central@23.09.6-16.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-0:23.09.6-16.el9fdp.x86_64",
"product": {
"name": "ovn23.09-host-0:23.09.6-16.el9fdp.x86_64",
"product_id": "ovn23.09-host-0:23.09.6-16.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host@23.09.6-16.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64",
"product": {
"name": "ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64",
"product_id": "ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.6-16.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64",
"product": {
"name": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64",
"product_id": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.6-16.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"product": {
"name": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"product_id": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.6-16.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"product": {
"name": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"product_id": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.6-16.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"product": {
"name": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"product_id": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.6-16.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"product": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"product_id": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.6-16.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.6-16.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-0:23.09.6-16.el9fdp.ppc64le",
"product_id": "ovn23.09-0:23.09.6-16.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.6-16.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le",
"product_id": "ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central@23.09.6-16.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le",
"product_id": "ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host@23.09.6-16.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le",
"product_id": "ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.6-16.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le",
"product_id": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.6-16.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"product_id": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.6-16.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"product_id": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.6-16.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"product_id": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.6-16.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"product": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"product_id": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.6-16.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.6-16.el9fdp.aarch64",
"product": {
"name": "ovn23.09-0:23.09.6-16.el9fdp.aarch64",
"product_id": "ovn23.09-0:23.09.6-16.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.6-16.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-0:23.09.6-16.el9fdp.aarch64",
"product": {
"name": "ovn23.09-central-0:23.09.6-16.el9fdp.aarch64",
"product_id": "ovn23.09-central-0:23.09.6-16.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central@23.09.6-16.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-0:23.09.6-16.el9fdp.aarch64",
"product": {
"name": "ovn23.09-host-0:23.09.6-16.el9fdp.aarch64",
"product_id": "ovn23.09-host-0:23.09.6-16.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host@23.09.6-16.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64",
"product": {
"name": "ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64",
"product_id": "ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.6-16.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64",
"product": {
"name": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64",
"product_id": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.6-16.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"product": {
"name": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"product_id": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.6-16.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"product": {
"name": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"product_id": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.6-16.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"product": {
"name": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"product_id": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.6-16.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"product": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"product_id": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.6-16.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.09-0:23.09.6-16.el9fdp.s390x",
"product": {
"name": "ovn23.09-0:23.09.6-16.el9fdp.s390x",
"product_id": "ovn23.09-0:23.09.6-16.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09@23.09.6-16.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-0:23.09.6-16.el9fdp.s390x",
"product": {
"name": "ovn23.09-central-0:23.09.6-16.el9fdp.s390x",
"product_id": "ovn23.09-central-0:23.09.6-16.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central@23.09.6-16.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-0:23.09.6-16.el9fdp.s390x",
"product": {
"name": "ovn23.09-host-0:23.09.6-16.el9fdp.s390x",
"product_id": "ovn23.09-host-0:23.09.6-16.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host@23.09.6-16.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x",
"product": {
"name": "ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x",
"product_id": "ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep@23.09.6-16.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x",
"product": {
"name": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x",
"product_id": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debugsource@23.09.6-16.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x",
"product": {
"name": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x",
"product_id": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-central-debuginfo@23.09.6-16.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x",
"product": {
"name": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x",
"product_id": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-debuginfo@23.09.6-16.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x",
"product": {
"name": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x",
"product_id": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-host-debuginfo@23.09.6-16.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x",
"product": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x",
"product_id": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.09-vtep-debuginfo@23.09.6-16.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.6-16.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.aarch64"
},
"product_reference": "ovn23.09-0:23.09.6-16.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.6-16.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-0:23.09.6-16.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.6-16.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.s390x"
},
"product_reference": "ovn23.09-0:23.09.6-16.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.6-16.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.src"
},
"product_reference": "ovn23.09-0:23.09.6-16.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-0:23.09.6-16.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.x86_64"
},
"product_reference": "ovn23.09-0:23.09.6-16.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-0:23.09.6-16.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.aarch64"
},
"product_reference": "ovn23.09-central-0:23.09.6-16.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-0:23.09.6-16.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.s390x"
},
"product_reference": "ovn23.09-central-0:23.09.6-16.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-0:23.09.6-16.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.x86_64"
},
"product_reference": "ovn23.09-central-0:23.09.6-16.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64"
},
"product_reference": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x"
},
"product_reference": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64"
},
"product_reference": "ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64"
},
"product_reference": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x"
},
"product_reference": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64"
},
"product_reference": "ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64"
},
"product_reference": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x"
},
"product_reference": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64"
},
"product_reference": "ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-0:23.09.6-16.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.aarch64"
},
"product_reference": "ovn23.09-host-0:23.09.6-16.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-0:23.09.6-16.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.s390x"
},
"product_reference": "ovn23.09-host-0:23.09.6-16.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-0:23.09.6-16.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.x86_64"
},
"product_reference": "ovn23.09-host-0:23.09.6-16.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64"
},
"product_reference": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x"
},
"product_reference": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64"
},
"product_reference": "ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64"
},
"product_reference": "ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x"
},
"product_reference": "ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64"
},
"product_reference": "ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64"
},
"product_reference": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le"
},
"product_reference": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x"
},
"product_reference": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64"
},
"product_reference": "ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-5265",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453458"
}
],
"notes": [
{
"category": "description",
"text": "When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header\u0027s self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5265"
},
{
"category": "external",
"summary": "RHBZ#2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265"
}
],
"release_date": "2026-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:42:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11698"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue"
},
{
"cve": "CVE-2026-5367",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-04-07T08:10:53.507000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2455863"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker\u0027s virtual machine port.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: OVN: Information disclosure via crafted DHCPv6 packets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important information disclosure flaw exists in OVN (Open Virtual Network) where a remote attacker can send specially crafted DHCPv6 SOLICIT packets to the `ovn-controller`. This can lead to an out-of-bounds read, disclosing sensitive heap memory information back to the attacker\u0027s virtual machine port. This vulnerability affects OVN deployments where DHCPv6 is enabled for logical switch ports.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5367"
},
{
"category": "external",
"summary": "RHBZ#2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367"
}
],
"release_date": "2026-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:42:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11698"
},
{
"category": "workaround",
"details": "The only potential mitigation is to disable the DHCPv6 feature for\nworkloads attached to OVN logical ports, e.g.:\n\novn-nbctl clear logical_switch_port \u003cworkload-port\u003e dhcpv6_options.\n\nWe do not recommend mitigating the vulnerability this way because it\nwill also disable legitimate DHCPv6 traffic originating from\nworkloads connected to logical switch ports.",
"product_ids": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.src",
"9Base-Fast-Datapath:ovn23.09-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-central-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-debugsource-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-host-debuginfo-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-0:23.09.6-16.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.09-vtep-debuginfo-0:23.09.6-16.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ovn: OVN: Information disclosure via crafted DHCPv6 packets"
}
]
}
RHSA-2026:11696
Vulnerability from csaf_redhat - Published: 2026-04-29 12:42 - Updated: 2026-04-29 18:27When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ovn23.06 is now available for Fast Datapath for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "OVN, the Open Virtual Network, is a system to support virtual network abstraction. OVN complements the existing capabilities of OVS to add native support for virtual network abstractions, such as virtual L2 and L3 overlays and security groups.\n\nSecurity Fix(es):\n\n* ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue (CVE-2026-5265)\n\n* ovn: OVN: Information disclosure via crafted DHCPv6 packets (CVE-2026-5367)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:11696",
"url": "https://access.redhat.com/errata/RHSA-2026:11696"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "FDP-3693",
"url": "https://issues.redhat.com/browse/FDP-3693"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_11696.json"
}
],
"title": "Red Hat Security Advisory: ovn23.06 security update",
"tracking": {
"current_release_date": "2026-04-29T18:27:19+00:00",
"generator": {
"date": "2026-04-29T18:27:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.7"
}
},
"id": "RHSA-2026:11696",
"initial_release_date": "2026-04-29T12:42:46+00:00",
"revision_history": [
{
"date": "2026-04-29T12:42:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-29T12:42:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-29T18:27:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product": {
"name": "Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::fastdatapath"
}
}
}
],
"category": "product_family",
"name": "Fast Datapath"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.4-30.el9fdp.src",
"product": {
"name": "ovn23.06-0:23.06.4-30.el9fdp.src",
"product_id": "ovn23.06-0:23.06.4-30.el9fdp.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.4-30.el9fdp?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.4-30.el9fdp.x86_64",
"product": {
"name": "ovn23.06-0:23.06.4-30.el9fdp.x86_64",
"product_id": "ovn23.06-0:23.06.4-30.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.4-30.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.4-30.el9fdp.x86_64",
"product": {
"name": "ovn23.06-central-0:23.06.4-30.el9fdp.x86_64",
"product_id": "ovn23.06-central-0:23.06.4-30.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.4-30.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.4-30.el9fdp.x86_64",
"product": {
"name": "ovn23.06-host-0:23.06.4-30.el9fdp.x86_64",
"product_id": "ovn23.06-host-0:23.06.4-30.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.4-30.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64",
"product": {
"name": "ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64",
"product_id": "ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.4-30.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64",
"product": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64",
"product_id": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.4-30.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"product_id": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.4-30.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"product_id": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.4-30.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"product_id": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.4-30.el9fdp?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.4-30.el9fdp?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.4-30.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-0:23.06.4-30.el9fdp.ppc64le",
"product_id": "ovn23.06-0:23.06.4-30.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.4-30.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le",
"product_id": "ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.4-30.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le",
"product_id": "ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.4-30.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le",
"product_id": "ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.4-30.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le",
"product_id": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.4-30.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"product_id": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.4-30.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"product_id": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.4-30.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"product_id": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.4-30.el9fdp?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.4-30.el9fdp?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.4-30.el9fdp.aarch64",
"product": {
"name": "ovn23.06-0:23.06.4-30.el9fdp.aarch64",
"product_id": "ovn23.06-0:23.06.4-30.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.4-30.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.4-30.el9fdp.aarch64",
"product": {
"name": "ovn23.06-central-0:23.06.4-30.el9fdp.aarch64",
"product_id": "ovn23.06-central-0:23.06.4-30.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.4-30.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.4-30.el9fdp.aarch64",
"product": {
"name": "ovn23.06-host-0:23.06.4-30.el9fdp.aarch64",
"product_id": "ovn23.06-host-0:23.06.4-30.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.4-30.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64",
"product": {
"name": "ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64",
"product_id": "ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.4-30.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64",
"product": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64",
"product_id": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.4-30.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"product_id": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.4-30.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"product_id": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.4-30.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"product_id": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.4-30.el9fdp?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.4-30.el9fdp?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ovn23.06-0:23.06.4-30.el9fdp.s390x",
"product": {
"name": "ovn23.06-0:23.06.4-30.el9fdp.s390x",
"product_id": "ovn23.06-0:23.06.4-30.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06@23.06.4-30.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-0:23.06.4-30.el9fdp.s390x",
"product": {
"name": "ovn23.06-central-0:23.06.4-30.el9fdp.s390x",
"product_id": "ovn23.06-central-0:23.06.4-30.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central@23.06.4-30.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-0:23.06.4-30.el9fdp.s390x",
"product": {
"name": "ovn23.06-host-0:23.06.4-30.el9fdp.s390x",
"product_id": "ovn23.06-host-0:23.06.4-30.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host@23.06.4-30.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x",
"product": {
"name": "ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x",
"product_id": "ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep@23.06.4-30.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x",
"product": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x",
"product_id": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debugsource@23.06.4-30.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x",
"product": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x",
"product_id": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-central-debuginfo@23.06.4-30.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x",
"product": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x",
"product_id": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-debuginfo@23.06.4-30.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x",
"product": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x",
"product_id": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-host-debuginfo@23.06.4-30.el9fdp?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x",
"product": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x",
"product_id": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ovn23.06-vtep-debuginfo@23.06.4-30.el9fdp?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.4-30.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.aarch64"
},
"product_reference": "ovn23.06-0:23.06.4-30.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.4-30.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-0:23.06.4-30.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.4-30.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.s390x"
},
"product_reference": "ovn23.06-0:23.06.4-30.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.4-30.el9fdp.src as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.src"
},
"product_reference": "ovn23.06-0:23.06.4-30.el9fdp.src",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-0:23.06.4-30.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.x86_64"
},
"product_reference": "ovn23.06-0:23.06.4-30.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.4-30.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.aarch64"
},
"product_reference": "ovn23.06-central-0:23.06.4-30.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.4-30.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.s390x"
},
"product_reference": "ovn23.06-central-0:23.06.4-30.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-0:23.06.4-30.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.x86_64"
},
"product_reference": "ovn23.06-central-0:23.06.4-30.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64"
},
"product_reference": "ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64"
},
"product_reference": "ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64"
},
"product_reference": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x"
},
"product_reference": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64"
},
"product_reference": "ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.4-30.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.aarch64"
},
"product_reference": "ovn23.06-host-0:23.06.4-30.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.4-30.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.s390x"
},
"product_reference": "ovn23.06-host-0:23.06.4-30.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-0:23.06.4-30.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.x86_64"
},
"product_reference": "ovn23.06-host-0:23.06.4-30.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64"
},
"product_reference": "ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64"
},
"product_reference": "ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x"
},
"product_reference": "ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64"
},
"product_reference": "ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x",
"relates_to_product_reference": "9Base-Fast-Datapath"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64 as a component of Fast Datapath for Red Hat Enterprise Linux 9",
"product_id": "9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64"
},
"product_reference": "ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"relates_to_product_reference": "9Base-Fast-Datapath"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-5265",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-03-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2453458"
}
],
"notes": [
{
"category": "description",
"text": "When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header\u0027s self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5265"
},
{
"category": "external",
"summary": "RHBZ#2453458",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453458"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5265"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5265"
}
],
"release_date": "2026-04-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:42:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11696"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ovn: ovn: Heap Over-Read in ICMP Error Response Generation - security issue"
},
{
"cve": "CVE-2026-5367",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"discovery_date": "2026-04-07T08:10:53.507000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2455863"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker\u0027s virtual machine port.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ovn: OVN: Information disclosure via crafted DHCPv6 packets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "An Important information disclosure flaw exists in OVN (Open Virtual Network) where a remote attacker can send specially crafted DHCPv6 SOLICIT packets to the `ovn-controller`. This can lead to an out-of-bounds read, disclosing sensitive heap memory information back to the attacker\u0027s virtual machine port. This vulnerability affects OVN deployments where DHCPv6 is enabled for logical switch ports.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-5367"
},
{
"category": "external",
"summary": "RHBZ#2455863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-5367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367"
}
],
"release_date": "2026-04-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-29T12:42:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:11696"
},
{
"category": "workaround",
"details": "The only potential mitigation is to disable the DHCPv6 feature for\nworkloads attached to OVN logical ports, e.g.:\n\novn-nbctl clear logical_switch_port \u003cworkload-port\u003e dhcpv6_options.\n\nWe do not recommend mitigating the vulnerability this way because it\nwill also disable legitimate DHCPv6 traffic originating from\nworkloads connected to logical switch ports.",
"product_ids": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.src",
"9Base-Fast-Datapath:ovn23.06-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-central-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-debugsource-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-host-debuginfo-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-0:23.06.4-30.el9fdp.x86_64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.aarch64",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.ppc64le",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.s390x",
"9Base-Fast-Datapath:ovn23.06-vtep-debuginfo-0:23.06.4-30.el9fdp.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "ovn: OVN: Information disclosure via crafted DHCPv6 packets"
}
]
}
FKIE_CVE-2026-5367
Vulnerability from fkie_nvd - Published: 2026-04-24 13:16 - Updated: 2026-04-29 18:16| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:11694 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:11695 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:11696 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:11698 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:11700 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:11701 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2026:11702 | ||
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2026-5367 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2455863 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2026/04/20/3 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2026/04/20/5 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker\u0027s virtual machine port."
}
],
"id": "CVE-2026-5367",
"lastModified": "2026-04-29T18:16:04.980",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2026-04-24T13:16:21.990",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:11694"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:11695"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:11696"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:11698"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:11700"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:11701"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2026:11702"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2026-5367"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2026/04/20/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2026/04/20/5"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-130"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
GHSA-R8VJ-9QGR-M84X
Vulnerability from github – Published: 2026-04-24 15:32 – Updated: 2026-04-24 15:32A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
{
"affected": [],
"aliases": [
"CVE-2026-5367"
],
"database_specific": {
"cwe_ids": [
"CWE-130"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-24T13:16:21Z",
"severity": "HIGH"
},
"details": "A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker\u0027s virtual machine port.",
"id": "GHSA-r8vj-9qgr-m84x",
"modified": "2026-04-24T15:32:32Z",
"published": "2026-04-24T15:32:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-5367"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2026-5367"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455863"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/04/20/3"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2026/04/20/5"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.