Executive Summary

Informations
Name CVE-2025-37857 First vendor Publication 2025-05-09
Vendor Cve Last vendor Modification 2025-05-12

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

scsi: st: Fix array overflow in st_setup()

Change the array size to follow parms size instead of a fixed value.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37857

Sources (Detail)

https://git.kernel.org/stable/c/574b399a7fb6ae71c97e26d122205c4a720c0e43
https://git.kernel.org/stable/c/736ae988bfb5932c05625baff70fba224d547c08
https://git.kernel.org/stable/c/7fe3b4deed8b93609058c37c9a11df1d2b2c0423
https://git.kernel.org/stable/c/a018d1cf990d0c339fe0e29b762ea5dc10567d67
https://git.kernel.org/stable/c/ad4c3037dc77739a625246a2a0fb23b8f3402c06
https://git.kernel.org/stable/c/c6015d0f7a2236ddb3928b2dfcb1c556a1368b55
https://git.kernel.org/stable/c/e4d1ca0a84a6650d3172eb8c07ef2fbc585b0d96
https://git.kernel.org/stable/c/e6b585d016c47ca8a37b92ea8a3fe35c0b585256
https://git.kernel.org/stable/c/f746fe0c51e044d1248dc67918328bfb3d86b639
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-05-27 02:57:29
  • First insertion