{
  "threat_severity" : "Moderate",
  "public_date" : "2025-06-18T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: Linux kernel: Denial of Service due to NULL pointer dereference in iSCSI target NOPIN timer handling",
    "id" : "2373376",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2373376"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-476",
  "details" : [ "In the Linux kernel, the following vulnerability has been resolved:\nscsi: target: iscsi: Fix timeout on deleted connection\nNOPIN response timer may expire on a deleted connection and crash with\nsuch logs:\nDid not receive response to NOPIN on CID: 0, failing connection for I_T Nexus (null),i,0x00023d000125,iqn.2017-01.com.iscsi.target,t,0x3d\nBUG: Kernel NULL pointer dereference on read at 0x00000000\nNIP  strlcpy+0x8/0xb0\nLR iscsit_fill_cxn_timeout_err_stats+0x5c/0xc0 [iscsi_target_mod]\nCall Trace:\niscsit_handle_nopin_response_timeout+0xfc/0x120 [iscsi_target_mod]\ncall_timer_fn+0x58/0x1f0\nrun_timer_softirq+0x740/0x860\n__do_softirq+0x16c/0x420\nirq_exit+0x188/0x1c0\ntimer_interrupt+0x184/0x410\nThat is because nopin response timer may be re-started on nopin timer\nexpiration.\nStop nopin timer before stopping the nopin response timer to be sure\nthat no one of them will be re-started.", "A flaw was found in the Linux kernel. The iSCSI (Internet Small Computer System Interface) target subsystem, which manages network-based storage connections, contains a vulnerability where a NOPIN response timer can improperly expire and restart on a deleted connection. This can lead to a NULL pointer dereference, a programming error that causes the system to crash. A local attacker could exploit this to cause a denial of service (DoS) on the affected system." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-11-11T00:00:00Z",
    "advisory" : "RHSA-2025:20518",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-611.5.1.el9_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-11-11T00:00:00Z",
    "advisory" : "RHSA-2025:20518",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "kernel-0:5.14.0-611.5.1.el9_7"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Under investigation",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Under investigation",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Fix deferred",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Out of support scope",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-38075\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-38075\nhttps://lore.kernel.org/linux-cve-announce/2025061840-CVE-2025-38075-19d6@gregkh/T" ],
  "name" : "CVE-2025-38075",
  "csaw" : false
}