CVE-2025-68229

Source
https://cve.org/CVERecord?id=CVE-2025-68229
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68229.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68229
Downstream
Related
Published
2025-12-16T13:57:21.835Z
Modified
2026-03-13T04:04:01.249080Z
Summary
scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show()
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: target: tcmloop: Fix segfault in tcmlooptpgaddress_show()

If the allocation of tlhba->sh fails in tcmloopdriverprobe() and we attempt to dereference it in tcmlooptpgaddressshow() we will get a segfault, see below for an example. So, check tl_hba->sh before dereferencing it.

Unable to allocate struct scsihost BUG: kernel NULL pointer dereference, address: 0000000000000194 #PF: supervisor read access in kernel mode #PF: errorcode(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 1 PID: 8356 Comm: tokio-runtime-w Not tainted 6.6.104.2-4.azl3 #1 Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 RIP: 0010:tcmlooptpgaddressshow+0x2e/0x50 [tcmloop] ... Call Trace: <TASK> configfsreaditer+0x12d/0x1d0 [configfs] vfsread+0x1b5/0x300 ksys_read+0x6f/0xf0 ...

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68229.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2628b352c3d4905adf8129ea50900bd980b6ccef
Fixed
63f511d3855f7f4b35dd63dbc58fc3d935a81268
Fixed
3d8c517f6eb27e47b1a198e05f8023038329b40b
Fixed
f449a1edd7a13bb025aaf9342ea6f8bf92684bbf
Fixed
1c9ba455b5073253ceaadae4859546e38e8261fe
Fixed
a6ef60898ddaf1414592ce3e5b0d94276d631663
Fixed
72e8831079266749a7023618a0de2f289a9dced6
Fixed
13aff3b8a7184281b134698704d6c06863a8361b
Fixed
e6965188f84a7883e6a0d3448e86b0cf29b24dfc

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68229.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.5.0
Fixed
5.4.302
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.247
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.197
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.159
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.118
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.60
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.10

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68229.json"