CVE-2025-37969

In the Linux kernel, the following vulnerability has been resolved: iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo Prevent st_lsm6dsx_read_tagged_fifo from falling in an infinite loop in case pattern_len is equal to zero and the device FIFO is not empty.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 20:30

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/16857370b3a30663515956b3bd27f3def6a2cf06 - () https://git.kernel.org/stable/c/16857370b3a30663515956b3bd27f3def6a2cf06 - Patch
References () https://git.kernel.org/stable/c/35b8c0a284983b71d92d082c54b7eb655ed4194f - () https://git.kernel.org/stable/c/35b8c0a284983b71d92d082c54b7eb655ed4194f - Patch
References () https://git.kernel.org/stable/c/4db7d923a8c298788181b796f71adf6ca499f966 - () https://git.kernel.org/stable/c/4db7d923a8c298788181b796f71adf6ca499f966 - Patch
References () https://git.kernel.org/stable/c/76727a1d81afde77d21ea8feaeb12d34605be6f4 - () https://git.kernel.org/stable/c/76727a1d81afde77d21ea8feaeb12d34605be6f4 - Patch
References () https://git.kernel.org/stable/c/8114ef86e2058e2554111b793596f17bee23fa15 - () https://git.kernel.org/stable/c/8114ef86e2058e2554111b793596f17bee23fa15 - Patch
References () https://git.kernel.org/stable/c/9ce662851380fe2018e36e15c0bdcb1ad177ed95 - () https://git.kernel.org/stable/c/9ce662851380fe2018e36e15c0bdcb1ad177ed95 - Patch
References () https://git.kernel.org/stable/c/9ddb4cf2192c213e4dba1733bbcdc94cf6d85bf7 - () https://git.kernel.org/stable/c/9ddb4cf2192c213e4dba1733bbcdc94cf6d85bf7 - Patch
References () https://git.kernel.org/stable/c/dadf9116108315f2eb14c7415c7805f392c476b4 - () https://git.kernel.org/stable/c/dadf9116108315f2eb14c7415c7805f392c476b4 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-667

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html -

03 Nov 2025, 18:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -

04 Jun 2025, 13:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: imu: st_lsm6dsx: corrige un posible bloqueo en st_lsm6dsx_read_tagged_fifo Evita que st_lsm6dsx_read_tagged_fifo caiga en un bucle infinito en caso de que pattern_len sea igual a cero y el FIFO del dispositivo no esté vacío.
References
  • () https://git.kernel.org/stable/c/4db7d923a8c298788181b796f71adf6ca499f966 -
  • () https://git.kernel.org/stable/c/76727a1d81afde77d21ea8feaeb12d34605be6f4 -

20 May 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-20 17:15

Updated : 2025-12-16 20:30


NVD link : CVE-2025-37969

Mitre link : CVE-2025-37969

CVE.ORG link : CVE-2025-37969


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-667

Improper Locking