Description

When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.

INFO

Published Date :

2026-04-24T12:25:06.808Z

Last Modified :

2026-04-29T18:27:24.243Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2026-5265 vulnerability.

Vendors Products
Redhat
  • Enterprise Linux
  • Fast Datapath

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact