๐Ÿ” CVE Alert

CVE-2025-38695

UNKNOWN 0.0

scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure If a call to lpfc_sli4_read_rev() from lpfc_sli4_hba_setup() fails, the resultant cleanup routine lpfc_sli4_vport_delete_fcp_xri_aborted() may occur before sli4_hba.hdwqs are allocated. This may result in a null pointer dereference when attempting to take the abts_io_buf_list_lock for the first hardware queue. Fix by adding a null ptr check on phba->sli4_hba.hdwq and early return because this situation means there must have been an error during port initialization.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 4, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
5e5b511d8bfaf765cb92a695cda336c936cb86dc < 6711ce7e9de4eb1a541ef30638df1294ea4267f8 5e5b511d8bfaf765cb92a695cda336c936cb86dc < 74bdf54a847dab209d2a8f65852f59b7fa156175 5e5b511d8bfaf765cb92a695cda336c936cb86dc < 5e25ee1ecec91c61a8acf938ad338399cad464de 5e5b511d8bfaf765cb92a695cda336c936cb86dc < add68606a01dcccf18837a53e85b85caf0693b4b 5e5b511d8bfaf765cb92a695cda336c936cb86dc < 7925dd68807cc8fd755b04ca99e7e6f1c04392e8 5e5b511d8bfaf765cb92a695cda336c936cb86dc < 571617f171f723b05f02d154a2e549a17eab4935 5e5b511d8bfaf765cb92a695cda336c936cb86dc < d3f55f46bb37a8ec73bfe3cfe36e3ecfa2945dfa 5e5b511d8bfaf765cb92a695cda336c936cb86dc < 46a0602c24d7d425dd8e00c749cd64a934aac7ec 5e5b511d8bfaf765cb92a695cda336c936cb86dc < 6698796282e828733cde3329c887b4ae9e5545e9
Linux / Linux
5.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/6711ce7e9de4eb1a541ef30638df1294ea4267f8 git.kernel.org: https://git.kernel.org/stable/c/74bdf54a847dab209d2a8f65852f59b7fa156175 git.kernel.org: https://git.kernel.org/stable/c/5e25ee1ecec91c61a8acf938ad338399cad464de git.kernel.org: https://git.kernel.org/stable/c/add68606a01dcccf18837a53e85b85caf0693b4b git.kernel.org: https://git.kernel.org/stable/c/7925dd68807cc8fd755b04ca99e7e6f1c04392e8 git.kernel.org: https://git.kernel.org/stable/c/571617f171f723b05f02d154a2e549a17eab4935 git.kernel.org: https://git.kernel.org/stable/c/d3f55f46bb37a8ec73bfe3cfe36e3ecfa2945dfa git.kernel.org: https://git.kernel.org/stable/c/46a0602c24d7d425dd8e00c749cd64a934aac7ec git.kernel.org: https://git.kernel.org/stable/c/6698796282e828733cde3329c887b4ae9e5545e9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html