In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: core: Add NULL check in ufshcdmcqcomplpendingtransfer()
Add a NULL check for the returned hwq pointer by ufshcdmcqreqtohwq().
This is similar to the fix in commit 74736103fb41 ("scsi: ufs: core: Fix ufshcdabortone racing issue").
[ { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@08a966a917fe3d92150fa3cc15793ad5e57051eb", "deprecated": false, "target": { "file": "drivers/ufs/core/ufshcd.c" }, "digest": { "line_hashes": [ "249787354460163867728483370542656725526", "270159429502772446616820791372395017432", "287902605302084387710893893789226375303", "194545127007216738301552849815804877604" ], "threshold": 0.9 }, "id": "CVE-2025-37826-32015953", "signature_type": "Line", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@700128d67d57bb1de4251e563ab85202def36c50", "deprecated": false, "target": { "file": "drivers/ufs/core/ufshcd.c" }, "digest": { "line_hashes": [ "249787354460163867728483370542656725526", "270159429502772446616820791372395017432", "287902605302084387710893893789226375303", "194545127007216738301552849815804877604" ], "threshold": 0.9 }, "id": "CVE-2025-37826-48ed0d61", "signature_type": "Line", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eeab6618037be84e438e9d6ed5d9a53502faf81f", "deprecated": false, "target": { "file": "drivers/ufs/core/ufshcd.c" }, "digest": { "line_hashes": [ "249787354460163867728483370542656725526", "270159429502772446616820791372395017432", "287902605302084387710893893789226375303", "194545127007216738301552849815804877604" ], "threshold": 0.9 }, "id": "CVE-2025-37826-7209b24d", "signature_type": "Line", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@700128d67d57bb1de4251e563ab85202def36c50", "deprecated": false, "target": { "file": "drivers/ufs/core/ufshcd.c", "function": "ufshcd_mcq_compl_pending_transfer" }, "digest": { "function_hash": "62066248677806385190319890074574706351", "length": 675.0 }, "id": "CVE-2025-37826-837fad92", "signature_type": "Function", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@eeab6618037be84e438e9d6ed5d9a53502faf81f", "deprecated": false, "target": { "file": "drivers/ufs/core/ufshcd.c", "function": "ufshcd_mcq_compl_pending_transfer" }, "digest": { "function_hash": "62066248677806385190319890074574706351", "length": 675.0 }, "id": "CVE-2025-37826-b10d9bea", "signature_type": "Function", "signature_version": "v1" }, { "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@08a966a917fe3d92150fa3cc15793ad5e57051eb", "deprecated": false, "target": { "file": "drivers/ufs/core/ufshcd.c", "function": "ufshcd_mcq_compl_pending_transfer" }, "digest": { "function_hash": "62066248677806385190319890074574706351", "length": 675.0 }, "id": "CVE-2025-37826-b3116edd", "signature_type": "Function", "signature_version": "v1" } ]