Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-21738
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-27 Feb, 2025 | 02:12
Updated At-02 Jan, 2026 | 15:28
Rejected At-
▼CVE Numbering Authority (CNA)
ata: libata-sff: Ensure that we cannot write outside the allocated buffer

In the Linux kernel, the following vulnerability has been resolved: ata: libata-sff: Ensure that we cannot write outside the allocated buffer reveliofuzzing reported that a SCSI_IOCTL_SEND_COMMAND ioctl with out_len set to 0xd42, SCSI command set to ATA_16 PASS-THROUGH, ATA command set to ATA_NOP, and protocol set to ATA_PROT_PIO, can cause ata_pio_sector() to write outside the allocated buffer, overwriting random memory. While a ATA device is supposed to abort a ATA_NOP command, there does seem to be a bug either in libata-sff or QEMU, where either this status is not set, or the status is cleared before read by ata_sff_hsm_move(). Anyway, that is most likely a separate bug. Looking at __atapi_pio_bytes(), it already has a safety check to ensure that __atapi_pio_bytes() cannot write outside the allocated buffer. Add a similar check to ata_pio_sector(), such that also ata_pio_sector() cannot write outside the allocated buffer.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/ata/libata-sff.c
Default Status
unaffected
Versions
Affected
  • From 5a5dbd18a7496ed403f6f54bb20c955c65482fa5 before a8f8cf87059ed1905c2a5c72f8b39a4f57b11b4c (git)
  • From 5a5dbd18a7496ed403f6f54bb20c955c65482fa5 before d5e6e3000309359eae2a17117aa6e3c44897bf6c (git)
  • From 5a5dbd18a7496ed403f6f54bb20c955c65482fa5 before 0dd5aade301a10f4b329fa7454fdcc2518741902 (git)
  • From 5a5dbd18a7496ed403f6f54bb20c955c65482fa5 before 0a17a9944b8d89ef03946121241870ac53ddaf45 (git)
  • From 5a5dbd18a7496ed403f6f54bb20c955c65482fa5 before 6e74e53b34b6dec5a50e1404e2680852ec6768d2 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/ata/libata-sff.c
Default Status
affected
Versions
Affected
  • 2.6.22
Unaffected
  • From 0 before 2.6.22 (semver)
  • From 6.1.129 through 6.1.* (semver)
  • From 6.6.78 through 6.6.* (semver)
  • From 6.12.14 through 6.12.* (semver)
  • From 6.13.3 through 6.13.* (semver)
  • From 6.14 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/a8f8cf87059ed1905c2a5c72f8b39a4f57b11b4c
N/A
https://git.kernel.org/stable/c/d5e6e3000309359eae2a17117aa6e3c44897bf6c
N/A
https://git.kernel.org/stable/c/0dd5aade301a10f4b329fa7454fdcc2518741902
N/A
https://git.kernel.org/stable/c/0a17a9944b8d89ef03946121241870ac53ddaf45
N/A
https://git.kernel.org/stable/c/6e74e53b34b6dec5a50e1404e2680852ec6768d2
N/A
Hyperlink: https://git.kernel.org/stable/c/a8f8cf87059ed1905c2a5c72f8b39a4f57b11b4c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/d5e6e3000309359eae2a17117aa6e3c44897bf6c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0dd5aade301a10f4b329fa7454fdcc2518741902
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/0a17a9944b8d89ef03946121241870ac53ddaf45
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6e74e53b34b6dec5a50e1404e2680852ec6768d2
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
Resource: N/A
Details not found