CVE-2025-68229
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | 6.6.104.2-4.azl3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's SCSI target driver tcm_loop. Specifically, if the allocation of tl_hba->sh fails in the tcm_loop_driver_probe() function, and the code later attempts to dereference this pointer in tcm_loop_tpg_address_show(), it causes a kernel segfault (crash). The fix involves checking if tl_hba->sh is NULL before dereferencing it to prevent the crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel NULL pointer dereference leading to a segfault) when the affected code path is executed. This can result in system instability, denial of service, or unexpected reboots, impacting availability of the system or services running on it.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for segfaults related to the tcm_loop module, specifically looking for NULL pointer dereference errors in tcm_loop_tpg_address_show(). You can use commands like 'dmesg | grep tcm_loop' or 'journalctl -k | grep tcm_loop' to check for such errors. Additionally, checking for BUG or Oops messages in the kernel logs that mention 'Unable to allocate struct scsi_host' or 'NULL pointer dereference' can help identify the issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the tcm_loop module has been fixed to check tl_hba->sh before dereferencing it, thus preventing the segfault. Until an update is applied, avoid using or triggering the tcm_loop target functionality that could lead to this NULL pointer dereference. Monitoring kernel logs for related errors can also help in early detection.