Acknowledged
Created: Dec 16, 2025
Updated: Dec 18, 2025
Found In Version: 10.23.30.1
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show()[EOL][EOL]If the allocation of tl_hba->sh fails in tcm_loop_driver_probe() and we[EOL]attempt to dereference it in tcm_loop_tpg_address_show() we will get a[EOL]segfault, see below for an example. So, check tl_hba->sh before[EOL]dereferencing it.[EOL][EOL] Unable to allocate struct scsi_host[EOL] BUG: kernel NULL pointer dereference, address: 0000000000000194[EOL] #PF: supervisor read access in kernel mode[EOL] #PF: error_code(0x0000) - not-present page[EOL] PGD 0 P4D 0[EOL] Oops: 0000 [#1] PREEMPT SMP NOPTI[EOL] CPU: 1 PID: 8356 Comm: tokio-runtime-w Not tainted 6.6.104.2-4.azl3 #1[EOL] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024[EOL] RIP: 0010:tcm_loop_tpg_address_show+0x2e/0x50 [tcm_loop][EOL]...[EOL] Call Trace:[EOL] <TASK>[EOL] configfs_read_iter+0x12d/0x1d0 [configfs][EOL] vfs_read+0x1b5/0x300[EOL] ksys_read+0x6f/0xf0[EOL]...