CVE-2025-68371
Published: December 25, 2025Last modified: December 25, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: smartpqi: Fix device resources accessed after device removal Correct possible race conditions during device removal. Previously, a scheduled work item to reset a LUN could still execute after the device was removed, leading to use-after-free and other resource access issues. This race condition occurs because the abort handler may schedule a LUN reset concurrently with device removal via sdev_destroy(), leading to use-after-free and improper access to freed resources. - Check in the device reset handler if the device is still present in the controller's SCSI device list before running; if not, the reset is skipped. - Cancel any pending TMF work that has not started in sdev_destroy(). - Ensure device freeing in sdev_destroy() is done while holding the LUN reset mutex to avoid races with ongoing resets.
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Fixed (6.1.161-r0) |
| 25 LTS | linux-lts | Fixed (6.12.65-r0) | |
| Stream | linux-lts | Fixed (6.12.63-r0) |
References
- https://git.kernel.org/stable/c/1a5c5a2f88e839af5320216a02ffb075b668596a
- https://git.kernel.org/stable/c/4e1acf1b6dd6dd0495bda139daafd7a403ae2dc1
- https://git.kernel.org/stable/c/6d2390653d82cad0e1ba2676e536dd99678f6ef1
- https://git.kernel.org/stable/c/7dfa5a5516ec3c6b9b6c22ee18f0eb2df3f38ef2
- https://git.kernel.org/stable/c/b518e86d1a70a88f6592a7c396cf1b93493d1aab
- https://git.kernel.org/stable/c/eccc02ba1747501d92bb2049e3ce378ba372f641