In the Linux kernel, the following vulnerability has been resolved:
scsi: target: Fix NULL pointer dereference in corescsi3decodespeci_port()
The function corescsi3decodespeciport(), in its error code path, unconditionally calls corescsi3lunaclundependitem() passing the destse_deve pointer, which may be NULL.
This can lead to a NULL pointer dereference if destsedeve remains unset.
SPC-3 PR SPECIPT: Unable to locate desttpg Unable to handle kernel paging request at virtual address dfff800000000012 Call trace: corescsi3lunaclundependitem+0x2c/0xf0 [targetcoremod] (P) corescsi3decodespeciport+0x120c/0x1c30 [targetcoremod] corescsi3emulateproregister+0x6b8/0xcd8 [targetcoremod] targetscsi3emulateprout+0x56c/0x840 [targetcoremod]
Fix this by adding a NULL check before calling corescsi3lunaclundependitem()
[
    {
        "signature_version": "v1",
        "id": "CVE-2025-38399-1eef3d63",
        "signature_type": "Function",
        "digest": {
            "length": 6968.0,
            "function_hash": "179919656682569028307843423583065717146"
        },
        "target": {
            "file": "drivers/target/target_core_pr.c",
            "function": "core_scsi3_decode_spec_i_port"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1627dda4d70ceb1ba62af2e401af73c09abb1eb5",
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "id": "CVE-2025-38399-2c3856c9",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "18965397333529645031397679042837769065",
                "191497658962933294590095644567156454494",
                "124309464607245692450073098145679364832",
                "161435735511713780462504314116435308199"
            ]
        },
        "target": {
            "file": "drivers/target/target_core_pr.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@55dfffc5e94730370b08de02c0cf3b7c951bbe9e",
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "id": "CVE-2025-38399-370076b7",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "18965397333529645031397679042837769065",
                "191497658962933294590095644567156454494",
                "124309464607245692450073098145679364832",
                "161435735511713780462504314116435308199"
            ]
        },
        "target": {
            "file": "drivers/target/target_core_pr.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d8ab68bdb294b09a761e967dad374f2965e1913f",
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "id": "CVE-2025-38399-398b3fae",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "18965397333529645031397679042837769065",
                "191497658962933294590095644567156454494",
                "124309464607245692450073098145679364832",
                "161435735511713780462504314116435308199"
            ]
        },
        "target": {
            "file": "drivers/target/target_core_pr.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c412185d557578d3f936537ed639c4ffaaed4075",
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "id": "CVE-2025-38399-7a347d15",
        "signature_type": "Function",
        "digest": {
            "length": 6979.0,
            "function_hash": "58344922671351069701196899623719752499"
        },
        "target": {
            "file": "drivers/target/target_core_pr.c",
            "function": "core_scsi3_decode_spec_i_port"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@55dfffc5e94730370b08de02c0cf3b7c951bbe9e",
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "id": "CVE-2025-38399-9a2e3e13",
        "signature_type": "Function",
        "digest": {
            "length": 6979.0,
            "function_hash": "58344922671351069701196899623719752499"
        },
        "target": {
            "file": "drivers/target/target_core_pr.c",
            "function": "core_scsi3_decode_spec_i_port"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d8ab68bdb294b09a761e967dad374f2965e1913f",
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "id": "CVE-2025-38399-b030458e",
        "signature_type": "Line",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "18965397333529645031397679042837769065",
                "191497658962933294590095644567156454494",
                "124309464607245692450073098145679364832",
                "161435735511713780462504314116435308199"
            ]
        },
        "target": {
            "file": "drivers/target/target_core_pr.c"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1627dda4d70ceb1ba62af2e401af73c09abb1eb5",
        "deprecated": false
    },
    {
        "signature_version": "v1",
        "id": "CVE-2025-38399-f8599f40",
        "signature_type": "Function",
        "digest": {
            "length": 6979.0,
            "function_hash": "58344922671351069701196899623719752499"
        },
        "target": {
            "file": "drivers/target/target_core_pr.c",
            "function": "core_scsi3_decode_spec_i_port"
        },
        "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c412185d557578d3f936537ed639c4ffaaed4075",
        "deprecated": false
    }
]