6.5

CVE-2024-2182

A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://www.github.com/ovn-org/ovn/
Package ovn
Default Statusunaffected
Version < *
Version 20.03.0
Status affected
VendorRed Hat
Product Fast Datapath for Red Hat Enterprise Linux 8
Default Statusaffected
Version < *
Version 0:23.06.1-112.el8fdp
Status unaffected
VendorRed Hat
Product Fast Datapath for Red Hat Enterprise Linux 8
Default Statusaffected
Version < *
Version 0:22.12.1-94.el8fdp
Status unaffected
VendorRed Hat
Product Fast Datapath for Red Hat Enterprise Linux 8
Default Statusaffected
Version < *
Version 0:22.03.3-71.el8fdp
Status unaffected
VendorRed Hat
Product Fast Datapath for Red Hat Enterprise Linux 8
Default Statusaffected
Version < *
Version 0:23.03.1-100.el8fdp
Status unaffected
VendorRed Hat
Product Fast Datapath for Red Hat Enterprise Linux 8
Default Statusaffected
Version < *
Version 0:21.12.0-142.el8fdp
Status unaffected
VendorRed Hat
Product Fast Datapath for Red Hat Enterprise Linux 9
Default Statusaffected
Version < *
Version 0:23.09.0-136.el9fdp
Status unaffected
VendorRed Hat
Product Fast Datapath for Red Hat Enterprise Linux 9
Default Statusaffected
Version < *
Version 0:23.06.1-112.el9fdp
Status unaffected
VendorRed Hat
Product Fast Datapath for Red Hat Enterprise Linux 9
Default Statusaffected
Version < *
Version 0:22.12.1-94.el9fdp
Status unaffected
VendorRed Hat
Product Fast Datapath for Red Hat Enterprise Linux 9
Default Statusaffected
Version < *
Version 0:22.03.3-71.el9fdp
Status unaffected
VendorRed Hat
Product Fast Datapath for Red Hat Enterprise Linux 9
Default Statusaffected
Version < *
Version 0:23.03.1-100.el9fdp
Status unaffected
VendorRed Hat
Product Fast Datapath for RHEL 7
Default Statusunknown
VendorRed Hat
Product Fast Datapath for RHEL 7
Default Statusunknown
VendorRed Hat
Product Fast Datapath for RHEL 7
Default Statusunknown
VendorRed Hat
Product Fast Datapath for RHEL 8
Default Statusunknown
VendorRed Hat
Product Fast Datapath for RHEL 8
Default Statusunknown
VendorRed Hat
Product Fast Datapath for RHEL 8
Default Statusunknown
VendorRed Hat
Product Fast Datapath for RHEL 8
Default Statusunknown
VendorRed Hat
Product Fast Datapath for RHEL 8
Default Statusunknown
VendorRed Hat
Product Fast Datapath for RHEL 9
Default Statusaffected
VendorRed Hat
Product Fast Datapath for RHEL 9
Default Statusunknown
VendorRed Hat
Product Fast Datapath for RHEL 9
Default Statusunknown
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.39% 0.591
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secalert@redhat.com 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE-346 Origin Validation Error

The product does not properly verify that the source of data or communication is valid.