-

CVE-2025-38399

In the Linux kernel, the following vulnerability has been resolved:

scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()

The function core_scsi3_decode_spec_i_port(), in its error code path,
unconditionally calls core_scsi3_lunacl_undepend_item() passing the
dest_se_deve pointer, which may be NULL.

This can lead to a NULL pointer dereference if dest_se_deve remains
unset.

SPC-3 PR SPEC_I_PT: Unable to locate dest_tpg
Unable to handle kernel paging request at virtual address dfff800000000012
Call trace:
  core_scsi3_lunacl_undepend_item+0x2c/0xf0 [target_core_mod] (P)
  core_scsi3_decode_spec_i_port+0x120c/0x1c30 [target_core_mod]
  core_scsi3_emulate_pro_register+0x6b8/0xcd8 [target_core_mod]
  target_scsi3_emulate_pr_out+0x56c/0x840 [target_core_mod]

Fix this by adding a NULL check before calling
core_scsi3_lunacl_undepend_item()

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 70ddb8133fdb512d4b1f2b4fd1c9e518514f182c
Version f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status affected
Version < 1129e0e0a833acf90429e0f13951068d5f026e4f
Version f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status affected
Version < 1627dda4d70ceb1ba62af2e401af73c09abb1eb5
Version f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status affected
Version < 55dfffc5e94730370b08de02c0cf3b7c951bbe9e
Version f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status affected
Version < 7296c938df2445f342be456a6ff0b3931d97f4e5
Version f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status affected
Version < c412185d557578d3f936537ed639c4ffaaed4075
Version f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status affected
Version < d8ab68bdb294b09a761e967dad374f2965e1913f
Version f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 5.9
Status affected
Version < 5.9
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.240
Status unaffected
Version <= 5.15.*
Version 5.15.187
Status unaffected
Version <= 6.1.*
Version 6.1.144
Status unaffected
Version <= 6.6.*
Version 6.6.97
Status unaffected
Version <= 6.12.*
Version 6.12.37
Status unaffected
Version <= 6.15.*
Version 6.15.6
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.103
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string