CVE-2025-68782
Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: Reset t_task_cdb pointer in error case
If allocation of cmd->t_task_cdb fails, it remains NULL but is later dereferenced in the 'err' path.
In case of error, reset NULL t_task_cdb value to point at the default fixed-size buffer.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null pointer dereference in the Linux kernel's SCSI target subsystem occurs when t_task_cdb allocation fails, leading to a crash in the error path.
Vulnerability
Overview
In the Linux kernel's SCSI target subsystem, a null pointer dereference vulnerability exists in the error handling path of command descriptor block (CDB) allocation. When the allocation of cmd->t_task_cdb fails, the pointer remains NULL. However, the error path subsequently dereferences this pointer, leading to a kernel crash [1].
Root
Cause and Exploitation
The root cause is a missing reset of the t_task_cdb pointer to the default fixed-size buffer in the allocation failure case. The kernel's SCSI target code allocates a separate the CDB buffer from the command structure; if the dynamic allocation fails, the pointer is left NULL. The error path attempts to use it. An attacker with the ability to trigger CDB allocation failures (e.g., by exhausting memory or via crafted SCSI commands) could exploit this to cause a denial-of-service (DoS) via a kernel panic [2].
Impact
Successful exploitation results in a kernel crash, leading to a denial-of-service condition. The vulnerability is local in scope, requiring access to the SCSI target subsystem, but does not require authentication beyond normal system access. No privilege escalation or data corruption is indicated [3].
Mitigation
The fix resets the t_task_cdb pointer to the default fixed-size buffer when allocation fails, preventing the null dereference. The patch has been applied to the stable kernel branches. Users should update to a kernel version containing the fix or apply the relevant patch [1][2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/0260ad551b0815eb788d47f32899fbcd65d6f128nvd
- git.kernel.org/stable/c/0d36db68fdb8a3325386fd9523b67735f944e1f3nvd
- git.kernel.org/stable/c/45fd86b444105c8bd07a763f58635c87e5dc7aeanvd
- git.kernel.org/stable/c/5053eab38a4c4543522d0c320c639c56a8b59908nvd
- git.kernel.org/stable/c/6cac97b12bdab04832e0416d049efcd0d48d303bnvd
- git.kernel.org/stable/c/8727663ded659aad55eef21e3864ebf5a4796a96nvd
- git.kernel.org/stable/c/8edbb9e371af186b4cf40819dab65fafe109df4dnvd
News mentions
0No linked articles in our index yet.