<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for openvswitch is now available for openEuler-24.03-LTS-SP1</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-1872</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-04-11</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-04-11</InitialReleaseDate>
		<CurrentReleaseDate>2026-04-11</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-04-11</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">openvswitch security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for openvswitch is now available for openEuler-24.03-LTS-SP1</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic.

Security Fix(es):

[&quot;Description\n===========\n\nMultiple versions of Open vSwitch are vulnerable to crafted FTP payloads\ncausing invalid memory accesses, potential denial of service, and possible\nremote code execution.  This impacts the userspace implementation of\nconntrack.  Triggering the vulnerability requires that Open vSwitch has\nconfigured conntrack flows specifying the FTP alg handler.  Conntrack\nhandlers in userspace are not automatically applied.\n\nThe issue is caused by type narrowing when copying FTP substrings.  It\nhas existed in all versions of the userspace conntrack supporting the\nFTP handler.  This was introduced with Open vSwitch version 2.8.0 and\naffects all versions up to 3.7.0.\n\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned CVE-2026-34956 identifier to this issue.  At the time of writing\nthe flaw is considered with Moderate impact and 5.9 CVSS.\n\n\nMitigation\n==========\n\nFor any affected version of Open vSwitch, avoiding the FTP alg will\nprevent the issue from triggering.  The Open vSwitch team does not\nrecommend attempting to mitigate the vulnerability this way because it\nmay impact packet forwarding.\n\nBy default, alg handlers are not installed, and must be added as part\nof the OpenFlow rules (via &apos;ct(alg=ftp)&apos; for example).\n\nUsers can check if they are using affected flows by looking at their\nOpenFlow ruleset for their bridges, for example:\n\n   ovs-ofctl dump-flows &lt;bridge&gt; | grep &apos;alg=ftp&apos;\n\nWe have found that Open vSwitch may be subject to heap corruption when\nprocessing FTP messages.\n\n\nFix\n===\n\nPatches to fix this vulnerability in Open vSwitch 3.3 and newer are\napplied to the appropriate branches, and the original patch is located\nat:&quot;, &apos;Recommendation\n==============\n\nWe recommend that users of Open vSwitch apply the included patch, or\nupgrade to a known patched version of Open vSwitch.  These include:\n\n* 3.3.9\n* 3.4.6\n* 3.5.4\n* 3.6.3\n* 3.7.1\n\n\nAcknowledgements\n================\n\nThe Open vSwitch team wishes to thank the reporter:\n\n  * Seiji Sakurai &lt;Seiji.Sakurai () outlook com&gt;&apos;](CVE-2026-34956)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for openvswitch is now available for openEuler-24.03-LTS-SP1.

openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">openvswitch</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1872</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-34956</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2026-34956</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="network-scripts-openvswitch-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">network-scripts-openvswitch-3.2.1-5.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-3.2.1-5.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-debuginfo-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-debuginfo-3.2.1-5.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-debugsource-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-debugsource-3.2.1-5.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-devel-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-devel-3.2.1-5.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-dpdk-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-dpdk-3.2.1-5.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-ipsec-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-ipsec-3.2.1-5.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-testcontroller-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-testcontroller-3.2.1-5.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="python3-openvswitch-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">python3-openvswitch-3.2.1-5.oe2403sp1.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="network-scripts-openvswitch-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">network-scripts-openvswitch-3.2.1-5.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-3.2.1-5.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-debuginfo-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-debuginfo-3.2.1-5.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-debugsource-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-debugsource-3.2.1-5.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-devel-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-devel-3.2.1-5.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-dpdk-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-dpdk-3.2.1-5.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-ipsec-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-ipsec-3.2.1-5.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="openvswitch-testcontroller-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-testcontroller-3.2.1-5.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="python3-openvswitch-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">python3-openvswitch-3.2.1-5.oe2403sp1.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="openvswitch-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-3.2.1-5.oe2403sp1.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="openvswitch-test-3.2.1-5" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openvswitch-test-3.2.1-5.oe2403sp1.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">[&quot;Description\n===========\n\nMultiple versions of Open vSwitch are vulnerable to crafted FTP payloads\ncausing invalid memory accesses, potential denial of service, and possible\nremote code execution.  This impacts the userspace implementation of\nconntrack.  Triggering the vulnerability requires that Open vSwitch has\nconfigured conntrack flows specifying the FTP alg handler.  Conntrack\nhandlers in userspace are not automatically applied.\n\nThe issue is caused by type narrowing when copying FTP substrings.  It\nhas existed in all versions of the userspace conntrack supporting the\nFTP handler.  This was introduced with Open vSwitch version 2.8.0 and\naffects all versions up to 3.7.0.\n\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned CVE-2026-34956 identifier to this issue.  At the time of writing\nthe flaw is considered with Moderate impact and 5.9 CVSS.\n\n\nMitigation\n==========\n\nFor any affected version of Open vSwitch, avoiding the FTP alg will\nprevent the issue from triggering.  The Open vSwitch team does not\nrecommend attempting to mitigate the vulnerability this way because it\nmay impact packet forwarding.\n\nBy default, alg handlers are not installed, and must be added as part\nof the OpenFlow rules (via &apos;ct(alg=ftp)&apos; for example).\n\nUsers can check if they are using affected flows by looking at their\nOpenFlow ruleset for their bridges, for example:\n\n   ovs-ofctl dump-flows &lt;bridge&gt; | grep &apos;alg=ftp&apos;\n\nWe have found that Open vSwitch may be subject to heap corruption when\nprocessing FTP messages.\n\n\nFix\n===\n\nPatches to fix this vulnerability in Open vSwitch 3.3 and newer are\napplied to the appropriate branches, and the original patch is located\nat:&quot;, &apos;Recommendation\n==============\n\nWe recommend that users of Open vSwitch apply the included patch, or\nupgrade to a known patched version of Open vSwitch.  These include:\n\n* 3.3.9\n* 3.4.6\n* 3.5.4\n* 3.6.3\n* 3.7.1\n\n\nAcknowledgements\n================\n\nThe Open vSwitch team wishes to thank the reporter:\n\n  * Seiji Sakurai &lt;Seiji.Sakurai () outlook com&gt;&apos;]</Note>
		</Notes>
		<ReleaseDate>2026-04-11</ReleaseDate>
		<CVE>CVE-2026-34956</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.9</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>openvswitch security update</Description>
				<DATE>2026-04-11</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1872</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>