Buffer overflow in Linux kernel scsi driver



| Updated: 2025-05-10
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-37857
CWE-ID CWE-119
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Buffer overflow

EUVDB-ID: #VU108888

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-37857

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory corruption within the validate_options() function in drivers/scsi/st.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 6.1 - 6.1.134

CPE2.3 External links

https://git.kernel.org/stable/c/574b399a7fb6ae71c97e26d122205c4a720c0e43
https://git.kernel.org/stable/c/736ae988bfb5932c05625baff70fba224d547c08
https://git.kernel.org/stable/c/7fe3b4deed8b93609058c37c9a11df1d2b2c0423
https://git.kernel.org/stable/c/a018d1cf990d0c339fe0e29b762ea5dc10567d67
https://git.kernel.org/stable/c/ad4c3037dc77739a625246a2a0fb23b8f3402c06
https://git.kernel.org/stable/c/c6015d0f7a2236ddb3928b2dfcb1c556a1368b55
https://git.kernel.org/stable/c/e4d1ca0a84a6650d3172eb8c07ef2fbc585b0d96
https://git.kernel.org/stable/c/e6b585d016c47ca8a37b92ea8a3fe35c0b585256
https://git.kernel.org/stable/c/f746fe0c51e044d1248dc67918328bfb3d86b639
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.135


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###