Home

Description

A flaw was found in Open vSwitch. When Open vSwitch is configured with a conntrack flow using FTP helpers over the userspace datapath, a remote attacker can send a specially crafted FTP stream with an EPASV command exceeding 255 characters. This heap access error can lead to a crash, resulting in a Denial of Service (DoS) for the affected system.

PUBLISHED Reserved 2026-03-31 | Published 2026-05-05 | Updated 2026-05-06 | Assigner redhat




MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2026-03-31:Reported to Red Hat.
2026-03-31:Made public.

Credits

Red Hat would like to thank Seiji Sakurai for reporting this issue.

References

www.openwall.com/lists/oss-security/2026/03/31/15

access.redhat.com/security/cve/CVE-2026-34956 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2453459 (RHBZ#2453459) issue-tracking

cve.org (CVE-2026-34956)

nvd.nist.gov (CVE-2026-34956)

Download JSON