-
CVE-2025-38399
- EPSS 0.04%
- Published 25.07.2025 13:15:29
- Last modified 25.07.2025 15:29:19
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() The function core_scsi3_decode_spec_i_port(), in its error code path, unconditionally calls core_scsi3_lunacl_undepend_item() passing the dest_se_deve pointer, which may be NULL. This can lead to a NULL pointer dereference if dest_se_deve remains unset. SPC-3 PR SPEC_I_PT: Unable to locate dest_tpg Unable to handle kernel paging request at virtual address dfff800000000012 Call trace: core_scsi3_lunacl_undepend_item+0x2c/0xf0 [target_core_mod] (P) core_scsi3_decode_spec_i_port+0x120c/0x1c30 [target_core_mod] core_scsi3_emulate_pro_register+0x6b8/0xcd8 [target_core_mod] target_scsi3_emulate_pr_out+0x56c/0x840 [target_core_mod] Fix this by adding a NULL check before calling core_scsi3_lunacl_undepend_item()
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
70ddb8133fdb512d4b1f2b4fd1c9e518514f182c
Version
f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status
affected
Version <
1129e0e0a833acf90429e0f13951068d5f026e4f
Version
f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status
affected
Version <
1627dda4d70ceb1ba62af2e401af73c09abb1eb5
Version
f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status
affected
Version <
55dfffc5e94730370b08de02c0cf3b7c951bbe9e
Version
f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status
affected
Version <
7296c938df2445f342be456a6ff0b3931d97f4e5
Version
f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status
affected
Version <
c412185d557578d3f936537ed639c4ffaaed4075
Version
f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status
affected
Version <
d8ab68bdb294b09a761e967dad374f2965e1913f
Version
f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
5.9
Status
affected
Version <
5.9
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.240
Status
unaffected
Version <=
5.15.*
Version
5.15.187
Status
unaffected
Version <=
6.1.*
Version
6.1.144
Status
unaffected
Version <=
6.6.*
Version
6.6.97
Status
unaffected
Version <=
6.12.*
Version
6.12.37
Status
unaffected
Version <=
6.15.*
Version
6.15.6
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.103 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|