Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-37789

Опубликовано: 01 мая 2025
Источник: debian
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix nested key length validation in the set() action It's not safe to access nla_len(ovs_key) if the data is smaller than the netlink header. Check that the attribute is OK first.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.12.25-1package
linuxfixed6.1.135-1bookwormpackage

Примечания

  • https://git.kernel.org/linus/65d91192aa66f05710cfddf6a14b5a25ee554dba (6.15-rc3)

EPSS

Процентиль: 14%
0.00047
Низкий

Связанные уязвимости

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix nested key length validation in the set() action It's not safe to access nla_len(ovs_key) if the data is smaller than the netlink header. Check that the attribute is OK first.

CVSS3: 6.1
redhat
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix nested key length validation in the set() action It's not safe to access nla_len(ovs_key) if the data is smaller than the netlink header. Check that the attribute is OK first.

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix nested key length validation in the set() action It's not safe to access nla_len(ovs_key) if the data is smaller than the netlink header. Check that the attribute is OK first.

msrc
около 2 месяцев назад

Описание отсутствует

github
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix nested key length validation in the set() action It's not safe to access nla_len(ovs_key) if the data is smaller than the netlink header. Check that the attribute is OK first.

EPSS

Процентиль: 14%
0.00047
Низкий