Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: scsi: st: Fix array overflow in st_setup() Change the array size to follow parms size instead of a fixed value.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 5.4.293 |
| Debian | Debian Linux | 11.0 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/574b399a7fb6ae71c97e26d122205c4a720c0e43Patch
- https://git.kernel.org/stable/c/736ae988bfb5932c05625baff70fba224d547c08Patch
- https://git.kernel.org/stable/c/7fe3b4deed8b93609058c37c9a11df1d2b2c0423Patch
- https://git.kernel.org/stable/c/a018d1cf990d0c339fe0e29b762ea5dc10567d67Patch
- https://git.kernel.org/stable/c/ad4c3037dc77739a625246a2a0fb23b8f3402c06Patch
- https://git.kernel.org/stable/c/c6015d0f7a2236ddb3928b2dfcb1c556a1368b55Patch
- https://git.kernel.org/stable/c/e4d1ca0a84a6650d3172eb8c07ef2fbc585b0d96Patch
- https://git.kernel.org/stable/c/e6b585d016c47ca8a37b92ea8a3fe35c0b585256Patch
- https://git.kernel.org/stable/c/f746fe0c51e044d1248dc67918328bfb3d86b639Patch
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2025-37857?
CVE-2025-37857 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: scsi: st: Fix array overflow in st_setup() Change the array size to follow parms size instead of a fixed value.
How severe is CVE-2025-37857?
CVE-2025-37857 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-37857?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux.