Untriaged
Permalink
CVE-2026-34956
5.9 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): HIGH
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse ignored package openvswitch-dpdk
Openvswitch: open vswitch: denial of service via malformed ftp epasv command
A flaw was found in Open vSwitch. When Open vSwitch is configured with a conntrack flow using FTP helpers over the userspace datapath, a remote attacker can send a specially crafted FTP stream with an EPASV command exceeding 255 characters. This heap access error can lead to a crash, resulting in a Denial of Service (DoS) for the affected system.
References
Affected products
rhcos
ovn2.11
ovn2.12
openvswitch
openvswitch3.0
openvswitch3.1
openvswitch3.2
openvswitch3.3
openvswitch3.4
openvswitch3.5
openvswitch3.6
openvswitch2.10
openvswitch2.11
openvswitch2.12
openvswitch2.13
openvswitch2.15
openvswitch2.16
openvswitch2.17
rhoso-openvswitch
rhosp-openvswitch
rhosp13/openstack-ovn-base
openvswitch-selinux-extra-policy
rhosp13/openstack-openvswitch-base
rhosp13/openstack-neutron-openvswitch-agent
rhosp-rhel8/openstack-neutron-openvswitch-agent
rhosp-rhel9/openstack-neutron-openvswitch-agent
Matching in nixpkgs
Package maintainers
-
@xddxdd Yuhui Xu <b980120@hotmail.com>
-
@booxter Ihar Hrachyshka <ihar.hrachyshka@gmail.com>
-
@adamcstephens Adam C. Stephens <happy.plan4249@valkor.net>