CVE-2025-37828

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-37828
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37828.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37828
Downstream
Related
Published
2025-05-08T06:26:20.135Z
Modified
2025-11-28T02:35:31.599495Z
Summary
scsi: ufs: mcq: Add NULL check in ufshcd_mcq_abort()
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: mcq: Add NULL check in ufshcdmcqabort()

A race can occur between the MCQ completion path and the abort handler: once a request completes, _blkmqfreerequest() sets rq->mqhctx to NULL, meaning the subsequent ufshcdmcqreqtohwq() call in ufshcdmcq_abort() can return a NULL pointer. If this NULL pointer is dereferenced, the kernel will crash.

Add a NULL check for the returned hwq pointer. If hwq is NULL, log an error and return FAILED, preventing a potential NULL-pointer dereference. As suggested by Bart, the ufshcdcmdinflight() check is removed.

This is similar to the fix in commit 74736103fb41 ("scsi: ufs: core: Fix ufshcdabortone racing issue").

This is found by our static analysis tool KNighter.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37828.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f1304d4420777f82a1d844c606db3d9eca841765
Fixed
d6979fabe812a168d5053e5a41d5a2e9b8afd7bf
Fixed
7d002f591486f5ef4bc02eb02025a53f931f0eb5
Fixed
47eec518aef3814f64a5da43df81bdd74d8c0041
Fixed
4c324085062919d4e21c69e5e78456dcec0052fe

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.5.0
Fixed
6.6.89
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.26
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.14.5