CVE-2025-68371
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/12/2025
Last modified:
11/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: smartpqi: Fix device resources accessed after device removal<br />
<br />
Correct possible race conditions during device removal.<br />
<br />
Previously, a scheduled work item to reset a LUN could still execute<br />
after the device was removed, leading to use-after-free and other<br />
resource access issues.<br />
<br />
This race condition occurs because the abort handler may schedule a LUN<br />
reset concurrently with device removal via sdev_destroy(), leading to<br />
use-after-free and improper access to freed resources.<br />
<br />
- Check in the device reset handler if the device is still present in<br />
the controller&#39;s SCSI device list before running; if not, the reset<br />
is skipped.<br />
<br />
- Cancel any pending TMF work that has not started in sdev_destroy().<br />
<br />
- Ensure device freeing in sdev_destroy() is done while holding the<br />
LUN reset mutex to avoid races with ongoing resets.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1a5c5a2f88e839af5320216a02ffb075b668596a
- https://git.kernel.org/stable/c/4e1acf1b6dd6dd0495bda139daafd7a403ae2dc1
- https://git.kernel.org/stable/c/6d2390653d82cad0e1ba2676e536dd99678f6ef1
- https://git.kernel.org/stable/c/7dfa5a5516ec3c6b9b6c22ee18f0eb2df3f38ef2
- https://git.kernel.org/stable/c/b518e86d1a70a88f6592a7c396cf1b93493d1aab
- https://git.kernel.org/stable/c/eccc02ba1747501d92bb2049e3ce378ba372f641



