Description
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
Problem types
Improper Handling of Length Parameter Inconsistency
Product status
Timeline
| 2026-04-07: | Reported to Red Hat. |
| 2026-04-13: | Made public. |
References
www.openwall.com/lists/oss-security/2026/04/20/3
www.openwall.com/lists/oss-security/2026/04/20/5
access.redhat.com/security/cve/CVE-2026-5367
bugzilla.redhat.com/show_bug.cgi?id=2455863 (RHBZ#2455863)