CVE-2025-37998

Source
https://cve.org/CVERecord?id=CVE-2025-37998
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37998.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37998
Downstream
Related
Published
2025-05-29T13:15:56.197Z
Modified
2026-03-20T12:42:36.868574Z
Summary
openvswitch: Fix unsafe attribute parsing in output_userspace()
Details

In the Linux kernel, the following vulnerability has been resolved:

openvswitch: Fix unsafe attribute parsing in output_userspace()

This patch replaces the manual Netlink attribute iteration in outputuserspace() with nlaforeachnested(), which ensures that only well-formed attributes are processed.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37998.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
ccb1352e76cff0524e7ccb2074826a092dd13016
Fixed
6712dc21506738f5f22b4f68b7c0d9e0df819dbd
Fixed
06b4f110c79716c181a8c5da007c259807840232
Fixed
47f7f00cf2fa3137d5c0416ef1a71bdf77901395
Fixed
bca8df998cce1fead8cbc69144862eadc2e34c87
Fixed
0236742bd959332181c1fcc41a05b7b709180501
Fixed
ec334aaab74705cc515205e1da3cb369fdfd93cd
Fixed
4fa672cbce9c86c3efb8621df1ae580d47813430
Fixed
6beb6835c1fbb3f676aebb51a5fee6b77fed9308

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37998.json"