In the Linux kernel, the following vulnerability has been resolved:
scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated
In case of an ib_fast_reg_mr allocation failure during iSER setup, the
machine hits a panic because iscsi_conn->dd_data is initialized
unconditionally, even when no memory is allocated (dd_size == 0). This
leads invalid pointer dereference during connection teardown.
Fix by setting iscsi_conn->dd_data only if memory is actually allocated.
Panic trace:
------------
iser: iser_create_fastreg_desc: Failed to allocate ib_fast_reg_mr err=-12
iser: iser_alloc_rx_descriptors: failed allocating rx descriptors / data buffers
BUG: unable to handle page fault for address: fffffffffffffff8
RIP: 0010:swake_up_locked.part.5+0xa/0x40
Call Trace:
complete+0x31/0x40
iscsi_iser_conn_stop+0x88/0xb0 [ib_iser]
iscsi_stop_conn+0x66/0xc0 [scsi_transport_iscsi]
iscsi_if_stop_conn+0x14a/0x150 [scsi_transport_iscsi]
iscsi_if_rx+0x1135/0x1834 [scsi_transport_iscsi]
? netlink_lookup+0x12f/0x1b0
? netlink_deliver_tap+0x2c/0x200
netlink_unicast+0x1ab/0x280
netlink_sendmsg+0x257/0x4f0
? _copy_from_user+0x29/0x60
sock_sendmsg+0x5f/0x70
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
09 Jan 2026, 17:04
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-476 | |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/2b242ea14386a510010eabfbfc3ce81a101f3802 - Patch | |
| References | () https://git.kernel.org/stable/c/35782c32528d82aa21f84cb5ceb2abd3526a8159 - Patch | |
| References | () https://git.kernel.org/stable/c/3ea3a256ed81f95ab0f3281a0e234b01a9cae605 - Patch | |
| References | () https://git.kernel.org/stable/c/66a373f50b4249d57f5a88c7be9676f9d5884865 - Patch | |
| References | () https://git.kernel.org/stable/c/9ea6d961566c7d762ed0204b06db05756fdda3b6 - Patch | |
| References | () https://git.kernel.org/stable/c/a145c269dc5380c063a20a0db7e6df2995962e9d - Patch | |
| References | () https://git.kernel.org/stable/c/a33d42b7fc24fe03f239fbb0880dd5b4b4b97c19 - Patch | |
| References | () https://git.kernel.org/stable/c/f53af99f441ee79599d8df6113a7144d74cf9153 - Patch | |
| References | () https://git.kernel.org/stable/c/fd5aad080edb501ab5c84b7623d612d0e3033403 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Sep 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-04 16:15
Updated : 2026-01-09 17:04
NVD link : CVE-2025-38700
Mitre link : CVE-2025-38700
CVE.ORG link : CVE-2025-38700
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
