CVE-2025-38289

Source
https://cve.org/CVERecord?id=CVE-2025-38289
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38289.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38289
Downstream
Related
Published
2025-07-10T07:42:05.645Z
Modified
2026-03-23T05:31:25.099938Z
Summary
scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Avoid potential ndlp use-after-free in devlosstmo_callbk

Smatch detected a potential use-after-free of an ndlp oject in devlosstmo_callbk during driver unload or fatal error handling.

Fix by reordering code to avoid potential use-after-free if initial nodelist reference has been previously removed.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38289.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e4913d4bc59227fbdfe6b8f5541f49aaea1cb41c
Fixed
ea405fb4144985d5c60f49c2abd9ba47ea44fdb4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4281f44ea8bfedd25938a0031bebba1473ece9ad
Fixed
4f09940b5581e44069eb31a66cf7f05c3c35ed04
Fixed
b5162bb6aa1ec04dff4509b025883524b6d7e7ca

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38289.json"