{"id":"CVE-2025-37998","summary":"openvswitch: Fix unsafe attribute parsing in output_userspace()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nopenvswitch: Fix unsafe attribute parsing in output_userspace()\n\nThis patch replaces the manual Netlink attribute iteration in\noutput_userspace() with nla_for_each_nested(), which ensures that only\nwell-formed attributes are processed.","modified":"2026-03-20T12:42:36.868574Z","published":"2025-05-29T13:15:56.197Z","related":["SUSE-SU-2025:02249-1","SUSE-SU-2025:02254-1","SUSE-SU-2025:02307-1","SUSE-SU-2025:02333-1","SUSE-SU-2025:02334-1","SUSE-SU-2025:02335-1","SUSE-SU-2025:02538-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:20413-1","SUSE-SU-2025:20421-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37998.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0236742bd959332181c1fcc41a05b7b709180501"},{"type":"WEB","url":"https://git.kernel.org/stable/c/06b4f110c79716c181a8c5da007c259807840232"},{"type":"WEB","url":"https://git.kernel.org/stable/c/47f7f00cf2fa3137d5c0416ef1a71bdf77901395"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4fa672cbce9c86c3efb8621df1ae580d47813430"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6712dc21506738f5f22b4f68b7c0d9e0df819dbd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6beb6835c1fbb3f676aebb51a5fee6b77fed9308"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bca8df998cce1fead8cbc69144862eadc2e34c87"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ec334aaab74705cc515205e1da3cb369fdfd93cd"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37998.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37998"},{"type":"ADVISORY","url":"https://www.zerodayinitiative.com/advisories/ZDI-25-307/"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ccb1352e76cff0524e7ccb2074826a092dd13016"},{"fixed":"6712dc21506738f5f22b4f68b7c0d9e0df819dbd"},{"fixed":"06b4f110c79716c181a8c5da007c259807840232"},{"fixed":"47f7f00cf2fa3137d5c0416ef1a71bdf77901395"},{"fixed":"bca8df998cce1fead8cbc69144862eadc2e34c87"},{"fixed":"0236742bd959332181c1fcc41a05b7b709180501"},{"fixed":"ec334aaab74705cc515205e1da3cb369fdfd93cd"},{"fixed":"4fa672cbce9c86c3efb8621df1ae580d47813430"},{"fixed":"6beb6835c1fbb3f676aebb51a5fee6b77fed9308"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37998.json"}}],"schema_version":"1.7.5"}