#VU108888 Buffer overflow in Linux kernel - CVE-2025-37857
Published: May 9, 2025 / Updated: May 10, 2025
Vulnerability identifier: #VU108888
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2025-37857
CWE-ID: CWE-119
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the validate_options() function in drivers/scsi/st.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
External links
- https://git.kernel.org/stable/c/574b399a7fb6ae71c97e26d122205c4a720c0e43
- https://git.kernel.org/stable/c/736ae988bfb5932c05625baff70fba224d547c08
- https://git.kernel.org/stable/c/7fe3b4deed8b93609058c37c9a11df1d2b2c0423
- https://git.kernel.org/stable/c/a018d1cf990d0c339fe0e29b762ea5dc10567d67
- https://git.kernel.org/stable/c/ad4c3037dc77739a625246a2a0fb23b8f3402c06
- https://git.kernel.org/stable/c/c6015d0f7a2236ddb3928b2dfcb1c556a1368b55
- https://git.kernel.org/stable/c/e4d1ca0a84a6650d3172eb8c07ef2fbc585b0d96
- https://git.kernel.org/stable/c/e6b585d016c47ca8a37b92ea8a3fe35c0b585256
- https://git.kernel.org/stable/c/f746fe0c51e044d1248dc67918328bfb3d86b639
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.135