CVE-2025-38399
scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In the Linux kernel, the following vulnerability has been resolved: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() The function core_scsi3_decode_spec_i_port(), in its error code path,
unconditionally calls core_scsi3_lunacl_undepend_item() passing the
dest_se_deve pointer, which may be NULL. This can lead to a NULL pointer dereference if dest_se_deve remains
unset. SPC-3 PR SPEC_I_PT: Unable to locate dest_tpg
Unable to handle kernel paging request at virtual address dfff800000000012
Call trace: core_scsi3_lunacl_undepend_item+0x2c/0xf0 [target_core_mod] (P) core_scsi3_decode_spec_i_port+0x120c/0x1c30 [target_core_mod] core_scsi3_emulate_pro_register+0x6b8/0xcd8 [target_core_mod] target_scsi3_emulate_pr_out+0x56c/0x840 [target_core_mod] Fix this by adding a NULL check before calling
core_scsi3_lunacl_undepend_item()
En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port(). La función core_scsi3_decode_spec_i_port(), en su ruta de código de error, llama incondicionalmente a core_scsi3_lunacl_undepend_item() pasando el puntero dest_se_deve, que puede ser NULL. Esto puede provocar una desreferencia de puntero NULL si dest_se_deve permanece sin definir. SPC-3 PR SPEC_I_PT: No se puede ubicar dest_tpg No se puede manejar la solicitud de paginación del núcleo en la dirección virtual dfff800000000012 Rastreo de llamadas: core_scsi3_lunacl_undepend_item+0x2c/0xf0 [target_core_mod] (P) core_scsi3_decode_spec_i_port+0x120c/0x1c30 [target_core_mod] core_scsi3_emulate_pro_register+0x6b8/0xcd8 [target_core_mod] target_scsi3_emulate_pr_out+0x56c/0x840 [target_core_mod] Solucione esto agregando una comprobación NULL antes de llamar a core_scsi3_lunacl_undepend_item()
CVSS Scores
SSVC
- Decision:-
Timeline
- 2025-04-16 CVE Reserved
- 2025-07-25 CVE Published
- 2025-07-28 CVE Updated
- 2025-07-31 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (7)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 5.10.240 Search vendor "Linux" for product "Linux Kernel" and version " < 5.10.240" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 5.15.187 Search vendor "Linux" for product "Linux Kernel" and version " < 5.15.187" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 6.1.144 Search vendor "Linux" for product "Linux Kernel" and version " < 6.1.144" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 6.6.97 Search vendor "Linux" for product "Linux Kernel" and version " < 6.6.97" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 6.12.37 Search vendor "Linux" for product "Linux Kernel" and version " < 6.12.37" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 6.15.6 Search vendor "Linux" for product "Linux Kernel" and version " < 6.15.6" | en |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 6.16 Search vendor "Linux" for product "Linux Kernel" and version " < 6.16" | en |
Affected
|