In the Linux kernel, the following vulnerability has been resolved:
scsi: st: Fix array overflow in st_setup()
Change the array size to follow parms size instead of a fixed value.
[
{
"target": {
"file": "drivers/scsi/st.c"
},
"digest": {
"line_hashes": [
"295905541195082852269091182898717406319",
"312593659928001179758976795930794140976",
"197352847695101378482248733530533745172",
"306219083712057743184834696227720245145"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@574b399a7fb6ae71c97e26d122205c4a720c0e43",
"deprecated": false,
"id": "CVE-2025-37857-02278890",
"signature_type": "Line"
},
{
"target": {
"function": "st_setup",
"file": "drivers/scsi/st.c"
},
"digest": {
"length": 911.0,
"function_hash": "305207469294397434654486598943953322562"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a018d1cf990d0c339fe0e29b762ea5dc10567d67",
"deprecated": false,
"id": "CVE-2025-37857-0453a08e",
"signature_type": "Function"
},
{
"target": {
"file": "drivers/scsi/st.c"
},
"digest": {
"line_hashes": [
"295905541195082852269091182898717406319",
"312593659928001179758976795930794140976",
"197352847695101378482248733530533745172",
"306219083712057743184834696227720245145"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a018d1cf990d0c339fe0e29b762ea5dc10567d67",
"deprecated": false,
"id": "CVE-2025-37857-2d1345ae",
"signature_type": "Line"
},
{
"target": {
"file": "drivers/scsi/st.c"
},
"digest": {
"line_hashes": [
"295905541195082852269091182898717406319",
"312593659928001179758976795930794140976",
"197352847695101378482248733530533745172",
"306219083712057743184834696227720245145"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad4c3037dc77739a625246a2a0fb23b8f3402c06",
"deprecated": false,
"id": "CVE-2025-37857-3231dc2c",
"signature_type": "Line"
},
{
"target": {
"function": "st_setup",
"file": "drivers/scsi/st.c"
},
"digest": {
"length": 911.0,
"function_hash": "305207469294397434654486598943953322562"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@574b399a7fb6ae71c97e26d122205c4a720c0e43",
"deprecated": false,
"id": "CVE-2025-37857-7e94ff12",
"signature_type": "Function"
},
{
"target": {
"function": "st_setup",
"file": "drivers/scsi/st.c"
},
"digest": {
"length": 911.0,
"function_hash": "305207469294397434654486598943953322562"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ad4c3037dc77739a625246a2a0fb23b8f3402c06",
"deprecated": false,
"id": "CVE-2025-37857-9712a208",
"signature_type": "Function"
},
{
"target": {
"function": "st_setup",
"file": "drivers/scsi/st.c"
},
"digest": {
"length": 911.0,
"function_hash": "305207469294397434654486598943953322562"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e4d1ca0a84a6650d3172eb8c07ef2fbc585b0d96",
"deprecated": false,
"id": "CVE-2025-37857-9bad3667",
"signature_type": "Function"
},
{
"target": {
"file": "drivers/scsi/st.c"
},
"digest": {
"line_hashes": [
"295905541195082852269091182898717406319",
"312593659928001179758976795930794140976",
"197352847695101378482248733530533745172",
"306219083712057743184834696227720245145"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@e4d1ca0a84a6650d3172eb8c07ef2fbc585b0d96",
"deprecated": false,
"id": "CVE-2025-37857-fc9dca53",
"signature_type": "Line"
}
]