vulnerability
Ubuntu: (Multiple Advisories) (CVE-2025-21656): Linux kernel vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | 2025-01-21 | 2025-03-28 | 2025-04-02 |
Description
In the Linux kernel, the following vulnerability has been resolved:
hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur
scsi_execute_cmd() function can return both negative (linux codes) and
positive (scsi_cmnd result field) error codes.
Currently the driver just passes error codes of scsi_execute_cmd() to
hwmon core, which is incorrect because hwmon only checks for negative
error codes. This leads to hwmon reporting uninitialized data to
userspace in case of SCSI errors (for example if the disk drive was
disconnected).
This patch checks scsi_execute_cmd() output and returns -EIO if it's
error code is positive.
[groeck: Avoid inline variable declaration for portability]
Solution(s)
References
- CVE-2025-21656
- https://attackerkb.com/topics/CVE-2025-21656
- UBUNTU-USN-7379-1
- UBUNTU-USN-7379-2
- UBUNTU-USN-7380-1
- UBUNTU-USN-7381-1
- UBUNTU-USN-7382-1
- URL-https://git.kernel.org/linus/82163d63ae7a4c36142cd252388737205bb7e4b9
- URL-https://git.kernel.org/stable/c/42268d885e44af875a6474f7bba519cc6cea6a9d
- URL-https://git.kernel.org/stable/c/53e25b10a28edaf8c2a1d3916fd8929501a50dfc
- URL-https://git.kernel.org/stable/c/82163d63ae7a4c36142cd252388737205bb7e4b9
- URL-https://ubuntu.com/security/notices/USN-7379-1
- URL-https://ubuntu.com/security/notices/USN-7380-1
- URL-https://ubuntu.com/security/notices/USN-7381-1
- URL-https://ubuntu.com/security/notices/USN-7382-1
- URL-https://www.cve.org/CVERecord?id=CVE-2025-21656

Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.