We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-37825

nvmet: fix out-of-bounds access in nvmet_enable_port



Description

In the Linux kernel, the following vulnerability has been resolved: nvmet: fix out-of-bounds access in nvmet_enable_port When trying to enable a port that has no transport configured yet, nvmet_enable_port() uses NVMF_TRTYPE_MAX (255) to query the transports array, causing an out-of-bounds access: [ 106.058694] BUG: KASAN: global-out-of-bounds in nvmet_enable_port+0x42/0x1da [ 106.058719] Read of size 8 at addr ffffffff89dafa58 by task ln/632 [...] [ 106.076026] nvmet: transport type 255 not supported Since commit 200adac75888, NVMF_TRTYPE_MAX is the default state as configured by nvmet_ports_make(). Avoid this by checking for NVMF_TRTYPE_MAX before proceeding.

Reserved 2025-04-16 | Published 2025-05-08 | Updated 2025-05-08 | Assigner Linux

Product status

Default status
unaffected

200adac75888182c09027e9b7852507dabd87034 before 83c00860a37b3fcba8026cb344101f1b8af547cf
affected

200adac75888182c09027e9b7852507dabd87034 before 3d7aa0c7b4e96cd460826d932e44710cdeb3378b
affected

Default status
affected

6.14
affected

Any version before 6.14
unaffected

6.14.5
unaffected

6.15-rc4
unaffected

References

git.kernel.org/...c/83c00860a37b3fcba8026cb344101f1b8af547cf

git.kernel.org/...c/3d7aa0c7b4e96cd460826d932e44710cdeb3378b

cve.org (CVE-2025-37825)

nvd.nist.gov (CVE-2025-37825)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-37825

Support options

Helpdesk Chat, Email, Knowledgebase