In the Linux kernel, the following vulnerability has been resolved:
scsi: target: Fix NULL pointer dereference in corescsi3decodespeci_port()
The function corescsi3decodespeciport(), in its error code path, unconditionally calls corescsi3lunaclundependitem() passing the destse_deve pointer, which may be NULL.
This can lead to a NULL pointer dereference if destsedeve remains unset.
SPC-3 PR SPECIPT: Unable to locate desttpg Unable to handle kernel paging request at virtual address dfff800000000012 Call trace: corescsi3lunaclundependitem+0x2c/0xf0 [targetcoremod] (P) corescsi3decodespeciport+0x120c/0x1c30 [targetcoremod] corescsi3emulateproregister+0x6b8/0xcd8 [targetcoremod] targetscsi3emulateprout+0x56c/0x840 [targetcoremod]
Fix this by adding a NULL check before calling corescsi3lunaclundependitem()
[
{
"id": "CVE-2025-38399-1eef3d63",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1627dda4d70ceb1ba62af2e401af73c09abb1eb5",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"function_hash": "179919656682569028307843423583065717146",
"length": 6968.0
},
"target": {
"function": "core_scsi3_decode_spec_i_port",
"file": "drivers/target/target_core_pr.c"
}
},
{
"id": "CVE-2025-38399-2c3856c9",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@55dfffc5e94730370b08de02c0cf3b7c951bbe9e",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"18965397333529645031397679042837769065",
"191497658962933294590095644567156454494",
"124309464607245692450073098145679364832",
"161435735511713780462504314116435308199"
]
},
"target": {
"file": "drivers/target/target_core_pr.c"
}
},
{
"id": "CVE-2025-38399-370076b7",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d8ab68bdb294b09a761e967dad374f2965e1913f",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"18965397333529645031397679042837769065",
"191497658962933294590095644567156454494",
"124309464607245692450073098145679364832",
"161435735511713780462504314116435308199"
]
},
"target": {
"file": "drivers/target/target_core_pr.c"
}
},
{
"id": "CVE-2025-38399-398b3fae",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c412185d557578d3f936537ed639c4ffaaed4075",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"18965397333529645031397679042837769065",
"191497658962933294590095644567156454494",
"124309464607245692450073098145679364832",
"161435735511713780462504314116435308199"
]
},
"target": {
"file": "drivers/target/target_core_pr.c"
}
},
{
"id": "CVE-2025-38399-7a347d15",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@55dfffc5e94730370b08de02c0cf3b7c951bbe9e",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"function_hash": "58344922671351069701196899623719752499",
"length": 6979.0
},
"target": {
"function": "core_scsi3_decode_spec_i_port",
"file": "drivers/target/target_core_pr.c"
}
},
{
"id": "CVE-2025-38399-9a2e3e13",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@d8ab68bdb294b09a761e967dad374f2965e1913f",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"function_hash": "58344922671351069701196899623719752499",
"length": 6979.0
},
"target": {
"function": "core_scsi3_decode_spec_i_port",
"file": "drivers/target/target_core_pr.c"
}
},
{
"id": "CVE-2025-38399-b030458e",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1627dda4d70ceb1ba62af2e401af73c09abb1eb5",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"18965397333529645031397679042837769065",
"191497658962933294590095644567156454494",
"124309464607245692450073098145679364832",
"161435735511713780462504314116435308199"
]
},
"target": {
"file": "drivers/target/target_core_pr.c"
}
},
{
"id": "CVE-2025-38399-f8599f40",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c412185d557578d3f936537ed639c4ffaaed4075",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Function",
"digest": {
"function_hash": "58344922671351069701196899623719752499",
"length": 6979.0
},
"target": {
"function": "core_scsi3_decode_spec_i_port",
"file": "drivers/target/target_core_pr.c"
}
}
]