CVE-2025-37857

In the Linux kernel, the following vulnerability has been resolved: scsi: st: Fix array overflow in st_setup() Change the array size to follow parms size instead of a fixed value.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

12 Nov 2025, 20:08

Type Values Removed Values Added
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CWE CWE-190
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/574b399a7fb6ae71c97e26d122205c4a720c0e43 - () https://git.kernel.org/stable/c/574b399a7fb6ae71c97e26d122205c4a720c0e43 - Patch
References () https://git.kernel.org/stable/c/736ae988bfb5932c05625baff70fba224d547c08 - () https://git.kernel.org/stable/c/736ae988bfb5932c05625baff70fba224d547c08 - Patch
References () https://git.kernel.org/stable/c/7fe3b4deed8b93609058c37c9a11df1d2b2c0423 - () https://git.kernel.org/stable/c/7fe3b4deed8b93609058c37c9a11df1d2b2c0423 - Patch
References () https://git.kernel.org/stable/c/a018d1cf990d0c339fe0e29b762ea5dc10567d67 - () https://git.kernel.org/stable/c/a018d1cf990d0c339fe0e29b762ea5dc10567d67 - Patch
References () https://git.kernel.org/stable/c/ad4c3037dc77739a625246a2a0fb23b8f3402c06 - () https://git.kernel.org/stable/c/ad4c3037dc77739a625246a2a0fb23b8f3402c06 - Patch
References () https://git.kernel.org/stable/c/c6015d0f7a2236ddb3928b2dfcb1c556a1368b55 - () https://git.kernel.org/stable/c/c6015d0f7a2236ddb3928b2dfcb1c556a1368b55 - Patch
References () https://git.kernel.org/stable/c/e4d1ca0a84a6650d3172eb8c07ef2fbc585b0d96 - () https://git.kernel.org/stable/c/e4d1ca0a84a6650d3172eb8c07ef2fbc585b0d96 - Patch
References () https://git.kernel.org/stable/c/e6b585d016c47ca8a37b92ea8a3fe35c0b585256 - () https://git.kernel.org/stable/c/e6b585d016c47ca8a37b92ea8a3fe35c0b585256 - Patch
References () https://git.kernel.org/stable/c/f746fe0c51e044d1248dc67918328bfb3d86b639 - () https://git.kernel.org/stable/c/f746fe0c51e044d1248dc67918328bfb3d86b639 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List, Third Party Advisory

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

12 May 2025, 17:32

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: st: Corregir desbordamiento de matriz en st_setup() Cambiar el tamaño de la matriz para seguir el tamaño de los parámetros en lugar de un valor fijo.

09 May 2025, 07:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-09 07:16

Updated : 2025-11-12 20:08


NVD link : CVE-2025-37857

Mitre link : CVE-2025-37857

CVE.ORG link : CVE-2025-37857


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound