In the Linux kernel, the following vulnerability has been resolved:
openvswitch: Fix unsafe attribute parsing in output_userspace()
This patch replaces the manual Netlink attribute iteration in
output_userspace() with nla_for_each_nested(), which ensures that only
well-formed attributes are processed.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
16 Dec 2025, 20:21
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* |
|
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/0236742bd959332181c1fcc41a05b7b709180501 - Patch | |
| References | () https://git.kernel.org/stable/c/06b4f110c79716c181a8c5da007c259807840232 - Patch | |
| References | () https://git.kernel.org/stable/c/47f7f00cf2fa3137d5c0416ef1a71bdf77901395 - Patch | |
| References | () https://git.kernel.org/stable/c/4fa672cbce9c86c3efb8621df1ae580d47813430 - Patch | |
| References | () https://git.kernel.org/stable/c/6712dc21506738f5f22b4f68b7c0d9e0df819dbd - Patch | |
| References | () https://git.kernel.org/stable/c/6beb6835c1fbb3f676aebb51a5fee6b77fed9308 - Patch | |
| References | () https://git.kernel.org/stable/c/bca8df998cce1fead8cbc69144862eadc2e34c87 - Patch | |
| References | () https://git.kernel.org/stable/c/ec334aaab74705cc515205e1da3cb369fdfd93cd - Patch | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-25-307/ - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory |
03 Nov 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
09 Aug 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Jun 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
29 May 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-29 14:15
Updated : 2025-12-16 20:21
NVD link : CVE-2025-37998
Mitre link : CVE-2025-37998
CVE.ORG link : CVE-2025-37998
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
