CVE-2025-37892

In the Linux kernel, the following vulnerability has been resolved: mtd: inftlcore: Add error check for inftl_read_oob() In INFTL_findwriteunit(), the return value of inftl_read_oob() need to be checked. A proper implementation can be found in INFTL_deleteblock(). The status will be set as SECTOR_IGNORE to break from the while-loop correctly if the inftl_read_oob() fails.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

12 Nov 2025, 20:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0300e751170cf80c05ca1a762a7b449e8ca6b693 - () https://git.kernel.org/stable/c/0300e751170cf80c05ca1a762a7b449e8ca6b693 - Patch
References () https://git.kernel.org/stable/c/114d94f095aa405fa9a51484c4be34846d7bb386 - () https://git.kernel.org/stable/c/114d94f095aa405fa9a51484c4be34846d7bb386 - Patch
References () https://git.kernel.org/stable/c/1c22356dfb041e5292835c9ff44d5f91bef8dd18 - () https://git.kernel.org/stable/c/1c22356dfb041e5292835c9ff44d5f91bef8dd18 - Patch
References () https://git.kernel.org/stable/c/5479a6af3c96f73bec2d2819532b6d6814f52dd6 - () https://git.kernel.org/stable/c/5479a6af3c96f73bec2d2819532b6d6814f52dd6 - Patch
References () https://git.kernel.org/stable/c/6af3b92b1c0b58ca281d0e1501bad2567f73c1a5 - () https://git.kernel.org/stable/c/6af3b92b1c0b58ca281d0e1501bad2567f73c1a5 - Patch
References () https://git.kernel.org/stable/c/7772621041ee78823ccc5f1fe38f6faa22af7023 - () https://git.kernel.org/stable/c/7772621041ee78823ccc5f1fe38f6faa22af7023 - Patch
References () https://git.kernel.org/stable/c/b828d394308e8e00df0a6f57e7dabae609bb8b7b - () https://git.kernel.org/stable/c/b828d394308e8e00df0a6f57e7dabae609bb8b7b - Patch
References () https://git.kernel.org/stable/c/d027951dc85cb2e15924c980dc22a6754d100c7c - () https://git.kernel.org/stable/c/d027951dc85cb2e15924c980dc22a6754d100c7c - Patch
References () https://git.kernel.org/stable/c/e7d6ceff95c55297f0ee8f9dbc4da5c558f30e9e - () https://git.kernel.org/stable/c/e7d6ceff95c55297f0ee8f9dbc4da5c558f30e9e - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List, Third Party Advisory
CWE NVD-CWE-noinfo
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 20:18

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mtd: inftlcore: Se ha añadido una comprobación de errores para inftl_read_oob(). En INFTL_findwriteunit(), es necesario comprobar el valor de retorno de inftl_read_oob(). Se puede encontrar una implementación adecuada en INFTL_deleteblock(). El estado se establecerá como SECTOR_IGNORE para interrumpir correctamente el bucle while si inftl_read_oob() falla.
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

20 May 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-20 11:15

Updated : 2025-11-12 20:35


NVD link : CVE-2025-37892

Mitre link : CVE-2025-37892

CVE.ORG link : CVE-2025-37892


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel