Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-37789
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-01 May, 2025 | 13:07
Updated At-03 Nov, 2025 | 19:55
Rejected At-
▼CVE Numbering Authority (CNA)
net: openvswitch: fix nested key length validation in the set() action

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix nested key length validation in the set() action It's not safe to access nla_len(ovs_key) if the data is smaller than the netlink header. Check that the attribute is OK first.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/openvswitch/flow_netlink.c
Default Status
unaffected
Versions
Affected
  • From ccb1352e76cff0524e7ccb2074826a092dd13016 before 54c6957d1123a2032099b9eab51c314800f677ce (git)
  • From ccb1352e76cff0524e7ccb2074826a092dd13016 before 7fcaec0b2ab8fa5fbf0b45e5512364a168f445bd (git)
  • From ccb1352e76cff0524e7ccb2074826a092dd13016 before a27526e6b48eee9e2d82efff502c4f272f1a91d4 (git)
  • From ccb1352e76cff0524e7ccb2074826a092dd13016 before 1489c195c8eecd262aa6712761ba5288203e28ec (git)
  • From ccb1352e76cff0524e7ccb2074826a092dd13016 before 824a7c2df5127b2402b68a21a265d413e78dcad7 (git)
  • From ccb1352e76cff0524e7ccb2074826a092dd13016 before be80768d4f3b6fd13f421451cc3fee8778aba8bc (git)
  • From ccb1352e76cff0524e7ccb2074826a092dd13016 before 03d7262dd53e8c404da35cc81aaa887fd901f76b (git)
  • From ccb1352e76cff0524e7ccb2074826a092dd13016 before 65d91192aa66f05710cfddf6a14b5a25ee554dba (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/openvswitch/flow_netlink.c
Default Status
affected
Versions
Affected
  • 3.3
Unaffected
  • From 0 before 3.3 (semver)
  • From 5.4.293 through 5.4.* (semver)
  • From 5.10.237 through 5.10.* (semver)
  • From 5.15.181 through 5.15.* (semver)
  • From 6.1.135 through 6.1.* (semver)
  • From 6.6.88 through 6.6.* (semver)
  • From 6.12.25 through 6.12.* (semver)
  • From 6.14.4 through 6.14.* (semver)
  • From 6.15 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/54c6957d1123a2032099b9eab51c314800f677ce
N/A
https://git.kernel.org/stable/c/7fcaec0b2ab8fa5fbf0b45e5512364a168f445bd
N/A
https://git.kernel.org/stable/c/a27526e6b48eee9e2d82efff502c4f272f1a91d4
N/A
https://git.kernel.org/stable/c/1489c195c8eecd262aa6712761ba5288203e28ec
N/A
https://git.kernel.org/stable/c/824a7c2df5127b2402b68a21a265d413e78dcad7
N/A
https://git.kernel.org/stable/c/be80768d4f3b6fd13f421451cc3fee8778aba8bc
N/A
https://git.kernel.org/stable/c/03d7262dd53e8c404da35cc81aaa887fd901f76b
N/A
https://git.kernel.org/stable/c/65d91192aa66f05710cfddf6a14b5a25ee554dba
N/A
Hyperlink: https://git.kernel.org/stable/c/54c6957d1123a2032099b9eab51c314800f677ce
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7fcaec0b2ab8fa5fbf0b45e5512364a168f445bd
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/a27526e6b48eee9e2d82efff502c4f272f1a91d4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1489c195c8eecd262aa6712761ba5288203e28ec
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/824a7c2df5127b2402b68a21a265d413e78dcad7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/be80768d4f3b6fd13f421451cc3fee8778aba8bc
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/03d7262dd53e8c404da35cc81aaa887fd901f76b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/65d91192aa66f05710cfddf6a14b5a25ee554dba
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
N/A
https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
Resource: N/A
Details not found