Redhat

Fast Datapath

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 05.05.2026 16:16:11
  • Zuletzt bearbeitet 05.05.2026 19:31:10

A flaw was found in Open vSwitch. When Open vSwitch is configured with a conntrack flow using FTP helpers over the userspace datapath, a remote attacker can send a specially crafted FTP stream with an EPASV command exceeding 255 characters. This heap...

  • EPSS 0.09%
  • Veröffentlicht 24.04.2026 12:25:06
  • Zuletzt bearbeitet 29.04.2026 19:16:24

When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without...

  • EPSS 0.06%
  • Veröffentlicht 24.04.2026 12:25:05
  • Zuletzt bearbeitet 29.04.2026 18:16:04

A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of...

  • EPSS 0.13%
  • Veröffentlicht 23.01.2025 17:15:22
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A flaw was found in the Open Virtual Network (OVN). Specially crafted UDP packets may bypass egress access control lists (ACLs) in OVN installations configured with a logical switch with DNS records set on it and if the same switch has any egress ACL...

  • EPSS 0.02%
  • Veröffentlicht 06.10.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 08:41:37

A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP addre...

  • EPSS 0.07%
  • Veröffentlicht 04.10.2023 12:15:10
  • Zuletzt bearbeitet 21.11.2024 08:16:34

A flaw was found in Open Virtual Network where the service monitor MAC does not properly rate limit. This issue could allow an attacker to cause a denial of service, including on deployments with CoPP enabled and properly configured.

  • EPSS 0.24%
  • Veröffentlicht 10.04.2023 22:15:09
  • Zuletzt bearbeitet 23.04.2025 17:16:28

A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath f...