Vulnerability Description
A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's virtual machine port.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2026:11694
- https://access.redhat.com/errata/RHSA-2026:11695
- https://access.redhat.com/errata/RHSA-2026:11696
- https://access.redhat.com/errata/RHSA-2026:11698
- https://access.redhat.com/errata/RHSA-2026:11700
- https://access.redhat.com/errata/RHSA-2026:11701
- https://access.redhat.com/errata/RHSA-2026:11702
- https://access.redhat.com/security/cve/CVE-2026-5367
- https://bugzilla.redhat.com/show_bug.cgi?id=2455863
- http://www.openwall.com/lists/oss-security/2026/04/20/3
- http://www.openwall.com/lists/oss-security/2026/04/20/5
FAQ
What is CVE-2026-5367?
CVE-2026-5367 is a vulnerability with a CVSS score of 8.6 (HIGH). A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cau...
How severe is CVE-2026-5367?
CVE-2026-5367 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5367?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.