CVE-2025-37773

In the Linux kernel, the following vulnerability has been resolved: virtiofs: add filesystem context source name check In certain scenarios, for example, during fuzz testing, the source name may be NULL, which could lead to a kernel panic. Therefore, an extra check for the source name should be added.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

05 Nov 2025, 17:49

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel
References () https://git.kernel.org/stable/c/599d1e2a6aecc44acf22fe7ea6f5e84a7e526abe - () https://git.kernel.org/stable/c/599d1e2a6aecc44acf22fe7ea6f5e84a7e526abe - Patch
References () https://git.kernel.org/stable/c/5ee09cdaf3414f6c92960714af46d3d90eede2f3 - () https://git.kernel.org/stable/c/5ee09cdaf3414f6c92960714af46d3d90eede2f3 - Patch
References () https://git.kernel.org/stable/c/9d6dcf18a1b49990295ac8a05fd9bdfd27ccbf88 - () https://git.kernel.org/stable/c/9d6dcf18a1b49990295ac8a05fd9bdfd27ccbf88 - Patch
References () https://git.kernel.org/stable/c/a648d80f8d9b208beee03a2d9aa690cfacf1d41e - () https://git.kernel.org/stable/c/a648d80f8d9b208beee03a2d9aa690cfacf1d41e - Patch
References () https://git.kernel.org/stable/c/a94fd938df2b1628da66b498aa0eeb89593bc7a2 - () https://git.kernel.org/stable/c/a94fd938df2b1628da66b498aa0eeb89593bc7a2 - Patch
References () https://git.kernel.org/stable/c/b84f13fdad10a543e2e65bab7e81b3f0bceabd67 - () https://git.kernel.org/stable/c/b84f13fdad10a543e2e65bab7e81b3f0bceabd67 - Patch
References () https://git.kernel.org/stable/c/c3e31d613951c299487844c4d1686a933e8ee291 - () https://git.kernel.org/stable/c/c3e31d613951c299487844c4d1686a933e8ee291 - Patch
References () https://git.kernel.org/stable/c/f6ec52710dc5e156b774cbef5d0f5c99b1c53a80 - () https://git.kernel.org/stable/c/f6ec52710dc5e156b774cbef5d0f5c99b1c53a80 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List
CWE NVD-CWE-noinfo

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

02 May 2025, 13:53

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virtiofs: añadir comprobación del nombre de la fuente en el contexto del sistema de archivos. En ciertos escenarios, por ejemplo, durante las pruebas fuzz, el nombre de la fuente puede ser nulo, lo que podría provocar un pánico del kernel. Por lo tanto, se debe añadir una comprobación adicional del nombre de la fuente.

02 May 2025, 07:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/5ee09cdaf3414f6c92960714af46d3d90eede2f3 -
  • () https://git.kernel.org/stable/c/9d6dcf18a1b49990295ac8a05fd9bdfd27ccbf88 -
  • () https://git.kernel.org/stable/c/b84f13fdad10a543e2e65bab7e81b3f0bceabd67 -

01 May 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-01 14:15

Updated : 2025-11-05 17:49


NVD link : CVE-2025-37773

Mitre link : CVE-2025-37773

CVE.ORG link : CVE-2025-37773


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel