Description
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
Published: 2026-04-24
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Workaround

The only potential mitigation is to disable the DHCPv6 feature for workloads attached to OVN logical ports, e.g.: ovn-nbctl clear logical_switch_port <workload-port> dhcpv6_options. We do not recommend mitigating the vulnerability this way because it will also disable legitimate DHCPv6 traffic originating from workloads connected to logical switch ports.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 18:00:00 +0000


Wed, 29 Apr 2026 13:15:00 +0000


Wed, 29 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:10::fastdatapath

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat fast Datapath
Redhat openshift Container Platform
Vendors & Products Redhat fast Datapath
Redhat openshift Container Platform

Tue, 28 Apr 2026 07:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:7::fastdatapath

Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Fri, 24 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Apr 2026 14:30:00 +0000


Fri, 24 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
Title Ovn: ovn: information disclosure via crafted dhcpv6 packets
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
Weaknesses CWE-130
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:7::fastdatapath
cpe:/o:redhat:enterprise_linux:8::fastdatapath
cpe:/o:redhat:enterprise_linux:9::fastdatapath
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}


Subscriptions

Redhat Enterprise Linux Fast Datapath Openshift Openshift Container Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-05-13T16:21:39.087Z

Reserved: 2026-04-01T18:39:05.229Z

Link: CVE-2026-5367

cve-icon Vulnrichment

Updated: 2026-04-24T13:37:14.640Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-24T13:16:21.990

Modified: 2026-04-29T18:16:04.980

Link: CVE-2026-5367

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-13T00:00:00Z

Links: CVE-2026-5367 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T14:30:33Z

Weaknesses