First published: Tue Jan 21 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur scsi_execute_cmd() function can return both negative (linux codes) and positive (scsi_cmnd result field) error codes. Currently the driver just passes error codes of scsi_execute_cmd() to hwmon core, which is incorrect because hwmon only checks for negative error codes. This leads to hwmon reporting uninitialized data to userspace in case of SCSI errors (for example if the disk drive was disconnected). This patch checks scsi_execute_cmd() output and returns -EIO if it's error code is positive. [groeck: Avoid inline variable declaration for portability]
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21656 has a medium severity rating due to its impact on data integrity during SCSI operations.
CVE-2025-21656 affects certain versions of the Linux Kernel that utilize the drivetemp hwmon driver.
To fix CVE-2025-21656, update your Linux Kernel to the latest patched version available from your distribution.
CVE-2025-21656 addresses SCSI execution errors that can result in inaccurate data being reported by the drivetemp driver.
While CVE-2025-21656 is classified as medium severity, it poses a risk to systems relying on accurate SCSI data reporting.