CVE-2025-38399

Source
https://cve.org/CVERecord?id=CVE-2025-38399
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38399.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38399
Downstream
Related
Published
2025-07-25T12:53:43.211Z
Modified
2026-03-12T02:15:45.726152Z
Summary
scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: target: Fix NULL pointer dereference in corescsi3decodespeci_port()

The function corescsi3decodespeciport(), in its error code path, unconditionally calls corescsi3lunaclundependitem() passing the destse_deve pointer, which may be NULL.

This can lead to a NULL pointer dereference if destsedeve remains unset.

SPC-3 PR SPECIPT: Unable to locate desttpg Unable to handle kernel paging request at virtual address dfff800000000012 Call trace: corescsi3lunaclundependitem+0x2c/0xf0 [targetcoremod] (P) corescsi3decodespeciport+0x120c/0x1c30 [targetcoremod] corescsi3emulateproregister+0x6b8/0xcd8 [targetcoremod] targetscsi3emulateprout+0x56c/0x840 [targetcoremod]

Fix this by adding a NULL check before calling corescsi3lunaclundependitem()

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38399.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039
Fixed
70ddb8133fdb512d4b1f2b4fd1c9e518514f182c
Fixed
1129e0e0a833acf90429e0f13951068d5f026e4f
Fixed
1627dda4d70ceb1ba62af2e401af73c09abb1eb5
Fixed
55dfffc5e94730370b08de02c0cf3b7c951bbe9e
Fixed
7296c938df2445f342be456a6ff0b3931d97f4e5
Fixed
c412185d557578d3f936537ed639c4ffaaed4075
Fixed
d8ab68bdb294b09a761e967dad374f2965e1913f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38399.json"