First published: Thu May 08 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: nvmet: fix out-of-bounds access in nvmet_enable_port When trying to enable a port that has no transport configured yet, nvmet_enable_port() uses NVMF_TRTYPE_MAX (255) to query the transports array, causing an out-of-bounds access: [ 106.058694] BUG: KASAN: global-out-of-bounds in nvmet_enable_port+0x42/0x1da [ 106.058719] Read of size 8 at addr ffffffff89dafa58 by task ln/632 [...] [ 106.076026] nvmet: transport type 255 not supported Since commit 200adac75888, NVMF_TRTYPE_MAX is the default state as configured by nvmet_ports_make(). Avoid this by checking for NVMF_TRTYPE_MAX before proceeding.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-37825 is classified as a moderate severity vulnerability due to potential out-of-bounds memory access.
To fix CVE-2025-37825, update your Linux kernel to the latest patched version provided by your distribution.
CVE-2025-37825 affects the Linux Kernel implementations that utilize the nvmet subsystem.
The risks associated with CVE-2025-37825 include system crashes and potential exploitation leading to unauthorized access.
CVE-2025-37825 was disclosed as part of a security update to the Linux kernel.