CVE-2025-37970

In the Linux kernel, the following vulnerability has been resolved: iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo Prevent st_lsm6dsx_read_fifo from falling in an infinite loop in case pattern_len is equal to zero and the device FIFO is not empty.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 20:31

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/159ca7f18129834b6f4c7eae67de48e96c752fc9 - () https://git.kernel.org/stable/c/159ca7f18129834b6f4c7eae67de48e96c752fc9 - Patch
References () https://git.kernel.org/stable/c/3bb6c02d6fe8347ce1785016d135ff539c20043c - () https://git.kernel.org/stable/c/3bb6c02d6fe8347ce1785016d135ff539c20043c - Patch
References () https://git.kernel.org/stable/c/6c4a5000618a8c44200d455c92e2f2a4db264717 - () https://git.kernel.org/stable/c/6c4a5000618a8c44200d455c92e2f2a4db264717 - Patch
References () https://git.kernel.org/stable/c/84e39f628a3a3333add99076e4d6c8b42b12d3a0 - () https://git.kernel.org/stable/c/84e39f628a3a3333add99076e4d6c8b42b12d3a0 - Patch
References () https://git.kernel.org/stable/c/a1cad8a3bca41dead9980615d35efc7bff1fd534 - () https://git.kernel.org/stable/c/a1cad8a3bca41dead9980615d35efc7bff1fd534 - Patch
References () https://git.kernel.org/stable/c/da33c4167b9cc1266a97215114cb74679f881d0c - () https://git.kernel.org/stable/c/da33c4167b9cc1266a97215114cb74679f881d0c - Patch
References () https://git.kernel.org/stable/c/f06a1a1954527cc4ed086d926c81ff236b2adde9 - () https://git.kernel.org/stable/c/f06a1a1954527cc4ed086d926c81ff236b2adde9 - Patch
References () https://git.kernel.org/stable/c/f3cf233c946531a92fe651ff2bd15ebbe60630a7 - () https://git.kernel.org/stable/c/f3cf233c946531a92fe651ff2bd15ebbe60630a7 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-667
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html -

03 Nov 2025, 18:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -

04 Jun 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/84e39f628a3a3333add99076e4d6c8b42b12d3a0 -
  • () https://git.kernel.org/stable/c/f06a1a1954527cc4ed086d926c81ff236b2adde9 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: imu: st_lsm6dsx: corrige un posible bloqueo en st_lsm6dsx_read_fifo Evita que st_lsm6dsx_read_fifo caiga en un bucle infinito en caso de que pattern_len sea igual a cero y el FIFO del dispositivo no esté vacío.

20 May 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-20 17:15

Updated : 2025-12-16 20:31


NVD link : CVE-2025-37970

Mitre link : CVE-2025-37970

CVE.ORG link : CVE-2025-37970


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-667

Improper Locking