cvelist/2024/2xxx/CVE-2024-2182.json
2024-05-28 23:00:35 +00:00

396 lines
20 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-2182",
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the Open Virtual Network (OVN). In OVN clusters where BFD is used between hypervisors for high availability, an attacker can inject specially crafted BFD packets from inside unprivileged workloads, including virtual machines or containers, that can trigger a denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Origin Validation Error",
"cweId": "CWE-346"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "Fast Datapath for Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:23.06.1-112.el8fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:22.12.1-94.el8fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:22.03.3-71.el8fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:23.03.1-100.el8fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Fast Datapath for Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:23.09.0-136.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:23.06.1-112.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:22.12.1-94.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:22.03.3-71.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"version": "0:23.03.1-100.el9fdp",
"lessThan": "*",
"versionType": "rpm",
"status": "unaffected"
}
],
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Fast Datapath for RHEL 7",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
}
]
}
},
{
"product_name": "Fast Datapath for RHEL 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
}
]
}
},
{
"product_name": "Fast Datapath for RHEL 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/12/5",
"refsource": "MISC",
"name": "http://www.openwall.com/lists/oss-security/2024/03/12/5"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1385",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:1385"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1386",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:1386"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1387",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:1387"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1388",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:1388"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1390",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:1390"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1391",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:1391"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1392",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:1392"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1393",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:1393"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1394",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHSA-2024:1394"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-2182",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2024-2182"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2267840"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APR4GCVCMQD3DQUKXDNGIXCCYGE5V7IT/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CB4N522FCS4XWAPUKRWZF6QZ657FCIDF/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRKXOOOKD56TY3JQVB45N3GCTX3EG4BV/"
},
{
"url": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html",
"refsource": "MISC",
"name": "https://mail.openvswitch.org/pipermail/ovs-announce/2024-March/000346.html"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/03/12/5",
"refsource": "MISC",
"name": "https://www.openwall.com/lists/oss-security/2024/03/12/5"
}
]
},
"work_around": [
{
"lang": "en",
"value": "null"
}
],
"credits": [
{
"lang": "en",
"value": "Red Hat would like to thank Frode Nordahl (Canonical) for reporting this issue."
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
}
}