CVE-2025-37857

Source
https://cve.org/CVERecord?id=CVE-2025-37857
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37857.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37857
Downstream
Published
2025-05-09T06:42:05.258Z
Modified
2026-03-20T12:42:31.155165Z
Summary
scsi: st: Fix array overflow in st_setup()
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: st: Fix array overflow in st_setup()

Change the array size to follow parms size instead of a fixed value.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37857.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2bec708a88ce053ffcb0dd8e373d1e46c6dc38a4
Fixed
736ae988bfb5932c05625baff70fba224d547c08
Fixed
574b399a7fb6ae71c97e26d122205c4a720c0e43
Fixed
c6015d0f7a2236ddb3928b2dfcb1c556a1368b55
Fixed
f746fe0c51e044d1248dc67918328bfb3d86b639
Fixed
e4d1ca0a84a6650d3172eb8c07ef2fbc585b0d96
Fixed
7fe3b4deed8b93609058c37c9a11df1d2b2c0423
Fixed
e6b585d016c47ca8a37b92ea8a3fe35c0b585256
Fixed
ad4c3037dc77739a625246a2a0fb23b8f3402c06
Fixed
a018d1cf990d0c339fe0e29b762ea5dc10567d67

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37857.json"