Untriaged
Permalink
CVE-2025-0650
8.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Ovn: egress acls may be bypassed via specially crafted udp packet
A flaw was found in the Open Virtual Network (OVN). Specially crafted UDP packets may bypass egress access control lists (ACLs) in OVN installations configured with a logical switch with DNS records set on it and if the same switch has any egress ACLs configured. This issue can lead to unauthorized access to virtual machines and containers running on the OVN network.
References
Affected products
ovn
- ==24.03.5
- ==22.03.8
- ==24.09.2
ovn2.11
ovn2.12
ovn2.13
ovn-2021
ovn22.03
- *
ovn22.06
- *
ovn22.09
- *
ovn22.12
- *
ovn23.03
- *
ovn23.06
- *
ovn23.09
- *
ovn24.03
- *
ovn24.09
- *
Matching in nixpkgs
pkgs.ovn
Open Virtual Network
pkgs.novnc
VNC client web application
pkgs.turbovnc
High-speed version of VNC derived from TightVNC
pkgs.nanovna-saver
A tool for reading, displaying and saving data from the NanoVNA
pkgs.python311Packages.slovnet
Deep-learning based NLP modeling for Russian language
Package maintainers
-
@zaninime Francesco Zanini <francesco@zanini.me>
-
@hesiod Tobias Markus <tobias@markus-regensburg.de>
-
@NeverBehave Xinhao Luo <i@never.pet>
-
@adamcstephens Adam C. Stephens <happy.plan4249@valkor.net>
-
@npatsakula Patsakula Nikita <nikita.patsakula@gmail.com>
-
@nh2 Niklas Hambüchen <mail@nh2.me>