SB2026011443 - Out-of-bounds read in Linux kernel openvswitch
Published: January 14, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Out-of-bounds read (CVE-ID: CVE-2025-68785)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the validate_and_copy_set_tun() and __ovs_nla_copy_actions() functions in net/openvswitch/flow_netlink.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/10ffc558246f2c75619aedda0921906095e46702
- https://git.kernel.org/stable/c/1b569db9c2f28b599e40050524aae5f7332bc294
- https://git.kernel.org/stable/c/2ecfc4433acdb149eafd7fb22d7fd4adf90b25e9
- https://git.kernel.org/stable/c/5ace7ef87f059d68b5f50837ef3e8a1a4870c36e
- https://git.kernel.org/stable/c/c999153bfb2d1d9b295b7010d920f2a7c6d7595f