In the Linux kernel, the following vulnerability has been resolved:
openvswitch: Fix unsafe attribute parsing in output_userspace()
This patch replaces the manual Netlink attribute iteration in
output_userspace() with nla_for_each_nested(), which ensures that only
well-formed attributes are processed.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Jun 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-241 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 04 Jun 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 30 May 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 29 May 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: openvswitch: Fix unsafe attribute parsing in output_userspace() This patch replaces the manual Netlink attribute iteration in output_userspace() with nla_for_each_nested(), which ensures that only well-formed attributes are processed. | |
Title | openvswitch: Fix unsafe attribute parsing in output_userspace() | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-06-04T12:57:45.635Z
Reserved: 2025-04-16T04:51:23.976Z
Link: CVE-2025-37998

No data.

Status : Awaiting Analysis
Published: 2025-05-29T14:15:36.450
Modified: 2025-06-04T13:15:28.633
Link: CVE-2025-37998
