Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID: <f7t8qb7enen.fsf@redhat.com>
Date: Tue, 31 Mar 2026 16:48:00 -0400
From: Aaron Conole <aconole@...hat.com>
To: ovs-announce@...nvswitch.org, oss-security@...ts.openwall.com
Subject: [ADVISORY] CVE-2026-34956: Open vSwitch: Invalid memory access in
 conntrack FTP alg.

Description
===========

Multiple versions of Open vSwitch are vulnerable to crafted FTP payloads
causing invalid memory accesses, potential denial of service, and possible
remote code execution.  This impacts the userspace implementation of
conntrack.  Triggering the vulnerability requires that Open vSwitch has
configured conntrack flows specifying the FTP alg handler.  Conntrack
handlers in userspace are not automatically applied.

The issue is caused by type narrowing when copying FTP substrings.  It
has existed in all versions of the userspace conntrack supporting the
FTP handler.  This was introduced with Open vSwitch version 2.8.0 and
affects all versions up to 3.7.0.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned CVE-2026-34956 identifier to this issue.  At the time of writing
the flaw is considered with Moderate impact and 5.9 CVSS.


Mitigation
==========

For any affected version of Open vSwitch, avoiding the FTP alg will
prevent the issue from triggering.  The Open vSwitch team does not
recommend attempting to mitigate the vulnerability this way because it
may impact packet forwarding.

By default, alg handlers are not installed, and must be added as part
of the OpenFlow rules (via 'ct(alg=ftp)' for example).

Users can check if they are using affected flows by looking at their
OpenFlow ruleset for their bridges, for example:

   ovs-ofctl dump-flows <bridge> | grep 'alg=ftp'

We have found that Open vSwitch may be subject to heap corruption when
processing FTP messages.


Fix
===

Patches to fix this vulnerability in Open vSwitch 3.3 and newer are
applied to the appropriate branches, and the original patch is located
at:

   https://mail.openvswitch.org/pipermail/ovs-dev/2026-March/431425.html


Recommendation
==============

We recommend that users of Open vSwitch apply the included patch, or
upgrade to a known patched version of Open vSwitch.  These include:

* 3.3.9
* 3.4.6
* 3.5.4
* 3.6.3
* 3.7.1


Acknowledgements
================

The Open vSwitch team wishes to thank the reporter:

  * Seiji Sakurai <Seiji.Sakurai@...look.com>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.