Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-37892 |
CWE-ID | CWE-125 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU109516
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-37892
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the INFTL_findwriteunit() function in drivers/mtd/inftlcore.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 5.15 - 5.15.180
CPE2.3https://git.kernel.org/stable/c/0300e751170cf80c05ca1a762a7b449e8ca6b693
https://git.kernel.org/stable/c/114d94f095aa405fa9a51484c4be34846d7bb386
https://git.kernel.org/stable/c/1c22356dfb041e5292835c9ff44d5f91bef8dd18
https://git.kernel.org/stable/c/5479a6af3c96f73bec2d2819532b6d6814f52dd6
https://git.kernel.org/stable/c/6af3b92b1c0b58ca281d0e1501bad2567f73c1a5
https://git.kernel.org/stable/c/7772621041ee78823ccc5f1fe38f6faa22af7023
https://git.kernel.org/stable/c/b828d394308e8e00df0a6f57e7dabae609bb8b7b
https://git.kernel.org/stable/c/d027951dc85cb2e15924c980dc22a6754d100c7c
https://git.kernel.org/stable/c/e7d6ceff95c55297f0ee8f9dbc4da5c558f30e9e
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.181
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.