{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38399","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:24.012Z","datePublished":"2025-07-25T12:53:43.211Z","dateUpdated":"2026-05-11T21:27:13.914Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:27:13.914Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()\n\nThe function core_scsi3_decode_spec_i_port(), in its error code path,\nunconditionally calls core_scsi3_lunacl_undepend_item() passing the\ndest_se_deve pointer, which may be NULL.\n\nThis can lead to a NULL pointer dereference if dest_se_deve remains\nunset.\n\nSPC-3 PR SPEC_I_PT: Unable to locate dest_tpg\nUnable to handle kernel paging request at virtual address dfff800000000012\nCall trace:\n  core_scsi3_lunacl_undepend_item+0x2c/0xf0 [target_core_mod] (P)\n  core_scsi3_decode_spec_i_port+0x120c/0x1c30 [target_core_mod]\n  core_scsi3_emulate_pro_register+0x6b8/0xcd8 [target_core_mod]\n  target_scsi3_emulate_pr_out+0x56c/0x840 [target_core_mod]\n\nFix this by adding a NULL check before calling\ncore_scsi3_lunacl_undepend_item()"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/target/target_core_pr.c"],"versions":[{"version":"f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039","lessThan":"70ddb8133fdb512d4b1f2b4fd1c9e518514f182c","status":"affected","versionType":"git"},{"version":"f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039","lessThan":"1129e0e0a833acf90429e0f13951068d5f026e4f","status":"affected","versionType":"git"},{"version":"f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039","lessThan":"1627dda4d70ceb1ba62af2e401af73c09abb1eb5","status":"affected","versionType":"git"},{"version":"f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039","lessThan":"55dfffc5e94730370b08de02c0cf3b7c951bbe9e","status":"affected","versionType":"git"},{"version":"f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039","lessThan":"7296c938df2445f342be456a6ff0b3931d97f4e5","status":"affected","versionType":"git"},{"version":"f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039","lessThan":"c412185d557578d3f936537ed639c4ffaaed4075","status":"affected","versionType":"git"},{"version":"f32ba612ef0f8eecaf6d2a5b04076ee7ea9ed039","lessThan":"d8ab68bdb294b09a761e967dad374f2965e1913f","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/target/target_core_pr.c"],"versions":[{"version":"5.9","status":"affected"},{"version":"0","lessThan":"5.9","status":"unaffected","versionType":"semver"},{"version":"5.10.240","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.187","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.144","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.97","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.37","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.15.6","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"5.10.240"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"5.15.187"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.1.144"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.6.97"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.12.37"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.15.6"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9","versionEndExcluding":"6.16"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/70ddb8133fdb512d4b1f2b4fd1c9e518514f182c"},{"url":"https://git.kernel.org/stable/c/1129e0e0a833acf90429e0f13951068d5f026e4f"},{"url":"https://git.kernel.org/stable/c/1627dda4d70ceb1ba62af2e401af73c09abb1eb5"},{"url":"https://git.kernel.org/stable/c/55dfffc5e94730370b08de02c0cf3b7c951bbe9e"},{"url":"https://git.kernel.org/stable/c/7296c938df2445f342be456a6ff0b3931d97f4e5"},{"url":"https://git.kernel.org/stable/c/c412185d557578d3f936537ed639c4ffaaed4075"},{"url":"https://git.kernel.org/stable/c/d8ab68bdb294b09a761e967dad374f2965e1913f"}],"title":"scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T17:37:31.744Z"}}]}}