CVE-2026-5265 PUBLISHED

Ovn: ovn: heap over-read in icmp error response generation - security issue

Assigner: redhat
Reserved: 31.03.2026 Published: 24.04.2026 Updated: 24.04.2026

When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
CVSS Score: 6.5

Product Status

Vendor Red Hat
Product Fast Datapath for RHEL 7
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 7
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 7
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 8
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 8
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 8
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 8
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 8
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 8
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 8
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 8
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 8
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 8
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 9
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 9
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 9
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 9
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 9
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 9
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 9
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 9
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 9
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 9
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 9
Versions Default: affected
Vendor Red Hat
Product Fast Datapath for RHEL 9
Versions Default: affected

Workarounds

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

References

Problem Types

  • Improper Handling of Length Parameter Inconsistency CWE