CVE-2025-68371

Published: Dic 24, 2025 Last Modified: Gen 11, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

scsi: smartpqi: Fix device resources accessed after device removal

Correct possible race conditions during device removal.

Previously, a scheduled work item to reset a LUN could still execute
after the device was removed, leading to use-after-free and other
resource access issues.

This race condition occurs because the abort handler may schedule a LUN
reset concurrently with device removal via sdev_destroy(), leading to
use-after-free and improper access to freed resources.

- Check in the device reset handler if the device is still present in
the controller's SCSI device list before running; if not, the reset
is skipped.

- Cancel any pending TMF work that has not started in sdev_destroy().

- Ensure device freeing in sdev_destroy() is done while holding the
LUN reset mutex to avoid races with ongoing resets.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0003
Percentile
0,1th
Updated

EPSS Score Trend (Last 83 Days)

https://git.kernel.org/stable/c/1a5c5a2f88e839af5320216a02ffb075b668596a
https://git.kernel.org/stable/c/4e1acf1b6dd6dd0495bda139daafd7a403ae2dc1
https://git.kernel.org/stable/c/6d2390653d82cad0e1ba2676e536dd99678f6ef1
https://git.kernel.org/stable/c/7dfa5a5516ec3c6b9b6c22ee18f0eb2df3f38ef2
https://git.kernel.org/stable/c/b518e86d1a70a88f6592a7c396cf1b93493d1aab
https://git.kernel.org/stable/c/eccc02ba1747501d92bb2049e3ce378ba372f641