CVE-2025-37998

In the Linux kernel, the following vulnerability has been resolved: openvswitch: Fix unsafe attribute parsing in output_userspace() This patch replaces the manual Netlink attribute iteration in output_userspace() with nla_for_each_nested(), which ensures that only well-formed attributes are processed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 20:21

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/0236742bd959332181c1fcc41a05b7b709180501 - () https://git.kernel.org/stable/c/0236742bd959332181c1fcc41a05b7b709180501 - Patch
References () https://git.kernel.org/stable/c/06b4f110c79716c181a8c5da007c259807840232 - () https://git.kernel.org/stable/c/06b4f110c79716c181a8c5da007c259807840232 - Patch
References () https://git.kernel.org/stable/c/47f7f00cf2fa3137d5c0416ef1a71bdf77901395 - () https://git.kernel.org/stable/c/47f7f00cf2fa3137d5c0416ef1a71bdf77901395 - Patch
References () https://git.kernel.org/stable/c/4fa672cbce9c86c3efb8621df1ae580d47813430 - () https://git.kernel.org/stable/c/4fa672cbce9c86c3efb8621df1ae580d47813430 - Patch
References () https://git.kernel.org/stable/c/6712dc21506738f5f22b4f68b7c0d9e0df819dbd - () https://git.kernel.org/stable/c/6712dc21506738f5f22b4f68b7c0d9e0df819dbd - Patch
References () https://git.kernel.org/stable/c/6beb6835c1fbb3f676aebb51a5fee6b77fed9308 - () https://git.kernel.org/stable/c/6beb6835c1fbb3f676aebb51a5fee6b77fed9308 - Patch
References () https://git.kernel.org/stable/c/bca8df998cce1fead8cbc69144862eadc2e34c87 - () https://git.kernel.org/stable/c/bca8df998cce1fead8cbc69144862eadc2e34c87 - Patch
References () https://git.kernel.org/stable/c/ec334aaab74705cc515205e1da3cb369fdfd93cd - () https://git.kernel.org/stable/c/ec334aaab74705cc515205e1da3cb369fdfd93cd - Patch
References () https://www.zerodayinitiative.com/advisories/ZDI-25-307/ - () https://www.zerodayinitiative.com/advisories/ZDI-25-307/ - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html -

03 Nov 2025, 18:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -

09 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://www.zerodayinitiative.com/advisories/ZDI-25-307/ -

04 Jun 2025, 13:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: openvswitch: corrige el análisis de atributos inseguro en output_userspace() Este parche reemplaza la iteración manual de atributos Netlink en output_userspace() con nla_for_each_nested(), que garantiza que solo se procesen los atributos bien formados.
References
  • () https://git.kernel.org/stable/c/06b4f110c79716c181a8c5da007c259807840232 -
  • () https://git.kernel.org/stable/c/6712dc21506738f5f22b4f68b7c0d9e0df819dbd -

29 May 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-29 14:15

Updated : 2025-12-16 20:21


NVD link : CVE-2025-37998

Mitre link : CVE-2025-37998

CVE.ORG link : CVE-2025-37998


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel