CVE-2025-38695

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure If a call to lpfc_sli4_read_rev() from lpfc_sli4_hba_setup() fails, the resultant cleanup routine lpfc_sli4_vport_delete_fcp_xri_aborted() may occur before sli4_hba.hdwqs are allocated. This may result in a null pointer dereference when attempting to take the abts_io_buf_list_lock for the first hardware queue. Fix by adding a null ptr check on phba->sli4_hba.hdwq and early return because this situation means there must have been an error during port initialization.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

09 Jan 2026, 17:06

Type Values Removed Values Added
CWE CWE-476
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/46a0602c24d7d425dd8e00c749cd64a934aac7ec - () https://git.kernel.org/stable/c/46a0602c24d7d425dd8e00c749cd64a934aac7ec - Patch
References () https://git.kernel.org/stable/c/571617f171f723b05f02d154a2e549a17eab4935 - () https://git.kernel.org/stable/c/571617f171f723b05f02d154a2e549a17eab4935 - Patch
References () https://git.kernel.org/stable/c/5e25ee1ecec91c61a8acf938ad338399cad464de - () https://git.kernel.org/stable/c/5e25ee1ecec91c61a8acf938ad338399cad464de - Patch
References () https://git.kernel.org/stable/c/6698796282e828733cde3329c887b4ae9e5545e9 - () https://git.kernel.org/stable/c/6698796282e828733cde3329c887b4ae9e5545e9 - Patch
References () https://git.kernel.org/stable/c/6711ce7e9de4eb1a541ef30638df1294ea4267f8 - () https://git.kernel.org/stable/c/6711ce7e9de4eb1a541ef30638df1294ea4267f8 - Patch
References () https://git.kernel.org/stable/c/74bdf54a847dab209d2a8f65852f59b7fa156175 - () https://git.kernel.org/stable/c/74bdf54a847dab209d2a8f65852f59b7fa156175 - Patch
References () https://git.kernel.org/stable/c/7925dd68807cc8fd755b04ca99e7e6f1c04392e8 - () https://git.kernel.org/stable/c/7925dd68807cc8fd755b04ca99e7e6f1c04392e8 - Patch
References () https://git.kernel.org/stable/c/add68606a01dcccf18837a53e85b85caf0693b4b - () https://git.kernel.org/stable/c/add68606a01dcccf18837a53e85b85caf0693b4b - Patch
References () https://git.kernel.org/stable/c/d3f55f46bb37a8ec73bfe3cfe36e3ecfa2945dfa - () https://git.kernel.org/stable/c/d3f55f46bb37a8ec73bfe3cfe36e3ecfa2945dfa - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

04 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-04 16:15

Updated : 2026-01-09 17:06


NVD link : CVE-2025-38695

Mitre link : CVE-2025-38695

CVE.ORG link : CVE-2025-38695


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference