First published: Thu May 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix nested key length validation in the set() action It's not safe to access nla_len(ovs_key) if the data is smaller than the netlink header. Check that the attribute is OK first.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | ||
Open vSwitch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-37789 has been classified as a medium severity vulnerability due to its potential impact on kernel data integrity.
To fix CVE-2025-37789, update to the latest version of the Linux kernel or Open vSwitch where the vulnerability has been addressed.
CVE-2025-37789 affects specific versions of the Linux kernel and all versions of Open vSwitch using the vulnerable code.
CVE-2025-37789 specifically impacts the netlink interface in the Linux kernel related to Open vSwitch.
As of the current reports, there is no indication that CVE-2025-37789 is actively being exploited in the wild.