Bug 2339537 (CVE-2025-0650)
| Summary: | CVE-2025-0650 ovn: egress ACLs may be bypassed via specially crafted UDP packet | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | CC: | echaudro, fleitner, ktraynor, rkhan |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: |
A flaw was found in the Open Virtual Network (OVN). Specially crafted UDP packets may bypass egress access control lists (ACLs) in OVN installations configured with a logical switch with DNS records set on it and if the same switch has any egress ACLs configured. This issue can lead to unauthorized access to virtual machines and containers running on the OVN network.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2339854, 2339855 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2025-01-22 15:54:41 UTC
This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 8 Via RHSA-2025:1084 https://access.redhat.com/errata/RHSA-2025:1084 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2025:1090 https://access.redhat.com/errata/RHSA-2025:1090 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 8 Via RHSA-2025:1083 https://access.redhat.com/errata/RHSA-2025:1083 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2025:1089 https://access.redhat.com/errata/RHSA-2025:1089 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 8 Via RHSA-2025:1085 https://access.redhat.com/errata/RHSA-2025:1085 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 8 Via RHSA-2025:1086 https://access.redhat.com/errata/RHSA-2025:1086 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 8 Via RHSA-2025:1087 https://access.redhat.com/errata/RHSA-2025:1087 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 8 Via RHSA-2025:1088 https://access.redhat.com/errata/RHSA-2025:1088 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2025:1092 https://access.redhat.com/errata/RHSA-2025:1092 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2025:1093 https://access.redhat.com/errata/RHSA-2025:1093 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2025:1091 https://access.redhat.com/errata/RHSA-2025:1091 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2025:1095 https://access.redhat.com/errata/RHSA-2025:1095 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2025:1094 https://access.redhat.com/errata/RHSA-2025:1094 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2025:1096 https://access.redhat.com/errata/RHSA-2025:1096 This issue has been addressed in the following products: Fast Datapath for Red Hat Enterprise Linux 9 Via RHSA-2025:1097 https://access.redhat.com/errata/RHSA-2025:1097 |