-

CVE-2025-68371

In the Linux kernel, the following vulnerability has been resolved:

scsi: smartpqi: Fix device resources accessed after device removal

Correct possible race conditions during device removal.

Previously, a scheduled work item to reset a LUN could still execute
after the device was removed, leading to use-after-free and other
resource access issues.

This race condition occurs because the abort handler may schedule a LUN
reset concurrently with device removal via sdev_destroy(), leading to
use-after-free and improper access to freed resources.

  - Check in the device reset handler if the device is still present in
    the controller's SCSI device list before running; if not, the reset
    is skipped.

  - Cancel any pending TMF work that has not started in sdev_destroy().

  - Ensure device freeing in sdev_destroy() is done while holding the
    LUN reset mutex to avoid races with ongoing resets.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 7dfa5a5516ec3c6b9b6c22ee18f0eb2df3f38ef2
Version 2d80f4054f7f901b8ad97358a9069616ac8524c7
Status affected
Version < 6d2390653d82cad0e1ba2676e536dd99678f6ef1
Version 2d80f4054f7f901b8ad97358a9069616ac8524c7
Status affected
Version < eccc02ba1747501d92bb2049e3ce378ba372f641
Version 2d80f4054f7f901b8ad97358a9069616ac8524c7
Status affected
Version < 4e1acf1b6dd6dd0495bda139daafd7a403ae2dc1
Version 2d80f4054f7f901b8ad97358a9069616ac8524c7
Status affected
Version < 1a5c5a2f88e839af5320216a02ffb075b668596a
Version 2d80f4054f7f901b8ad97358a9069616ac8524c7
Status affected
Version < b518e86d1a70a88f6592a7c396cf1b93493d1aab
Version 2d80f4054f7f901b8ad97358a9069616ac8524c7
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 6.0
Status affected
Version < 6.0
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.120
Status unaffected
Version <= 6.12.*
Version 6.12.63
Status unaffected
Version <= 6.17.*
Version 6.17.13
Status unaffected
Version <= 6.18.*
Version 6.18.2
Status unaffected
Version <= *
Version 6.19-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.