6.5
CVE-2024-2182
- EPSS 0.39%
- Published 12.03.2024 17:15:59
- Last modified 21.11.2024 09:09:12
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://www.github.com/ovn-org/ovn/
≫
Package
ovn
Default Statusunaffected
Version <
*
Version
20.03.0
Status
affected
VendorRed Hat
≫
Product
Fast Datapath for Red Hat Enterprise Linux 8
Default Statusaffected
Version <
*
Version
0:23.06.1-112.el8fdp
Status
unaffected
VendorRed Hat
≫
Product
Fast Datapath for Red Hat Enterprise Linux 8
Default Statusaffected
Version <
*
Version
0:22.12.1-94.el8fdp
Status
unaffected
VendorRed Hat
≫
Product
Fast Datapath for Red Hat Enterprise Linux 8
Default Statusaffected
Version <
*
Version
0:22.03.3-71.el8fdp
Status
unaffected
VendorRed Hat
≫
Product
Fast Datapath for Red Hat Enterprise Linux 8
Default Statusaffected
Version <
*
Version
0:23.03.1-100.el8fdp
Status
unaffected
VendorRed Hat
≫
Product
Fast Datapath for Red Hat Enterprise Linux 8
Default Statusaffected
Version <
*
Version
0:21.12.0-142.el8fdp
Status
unaffected
VendorRed Hat
≫
Product
Fast Datapath for Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
0:23.09.0-136.el9fdp
Status
unaffected
VendorRed Hat
≫
Product
Fast Datapath for Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
0:23.06.1-112.el9fdp
Status
unaffected
VendorRed Hat
≫
Product
Fast Datapath for Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
0:22.12.1-94.el9fdp
Status
unaffected
VendorRed Hat
≫
Product
Fast Datapath for Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
0:22.03.3-71.el9fdp
Status
unaffected
VendorRed Hat
≫
Product
Fast Datapath for Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
0:23.03.1-100.el9fdp
Status
unaffected
VendorRed Hat
≫
Product
Fast Datapath for RHEL 7
Default Statusunknown
VendorRed Hat
≫
Product
Fast Datapath for RHEL 7
Default Statusunknown
VendorRed Hat
≫
Product
Fast Datapath for RHEL 7
Default Statusunknown
VendorRed Hat
≫
Product
Fast Datapath for RHEL 8
Default Statusunknown
VendorRed Hat
≫
Product
Fast Datapath for RHEL 8
Default Statusunknown
VendorRed Hat
≫
Product
Fast Datapath for RHEL 8
Default Statusunknown
VendorRed Hat
≫
Product
Fast Datapath for RHEL 8
Default Statusunknown
VendorRed Hat
≫
Product
Fast Datapath for RHEL 8
Default Statusunknown
VendorRed Hat
≫
Product
Fast Datapath for RHEL 9
Default Statusaffected
VendorRed Hat
≫
Product
Fast Datapath for RHEL 9
Default Statusunknown
VendorRed Hat
≫
Product
Fast Datapath for RHEL 9
Default Statusunknown
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.39% | 0.591 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secalert@redhat.com | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
CWE-346 Origin Validation Error
The product does not properly verify that the source of data or communication is valid.