๐Ÿ” CVE Alert

CVE-2025-68371

UNKNOWN 0.0

scsi: smartpqi: Fix device resources accessed after device removal

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: smartpqi: Fix device resources accessed after device removal Correct possible race conditions during device removal. Previously, a scheduled work item to reset a LUN could still execute after the device was removed, leading to use-after-free and other resource access issues. This race condition occurs because the abort handler may schedule a LUN reset concurrently with device removal via sdev_destroy(), leading to use-after-free and improper access to freed resources. - Check in the device reset handler if the device is still present in the controller's SCSI device list before running; if not, the reset is skipped. - Cancel any pending TMF work that has not started in sdev_destroy(). - Ensure device freeing in sdev_destroy() is done while holding the LUN reset mutex to avoid races with ongoing resets.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 24, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2d80f4054f7f901b8ad97358a9069616ac8524c7 < 7dfa5a5516ec3c6b9b6c22ee18f0eb2df3f38ef2 2d80f4054f7f901b8ad97358a9069616ac8524c7 < 6d2390653d82cad0e1ba2676e536dd99678f6ef1 2d80f4054f7f901b8ad97358a9069616ac8524c7 < eccc02ba1747501d92bb2049e3ce378ba372f641 2d80f4054f7f901b8ad97358a9069616ac8524c7 < 4e1acf1b6dd6dd0495bda139daafd7a403ae2dc1 2d80f4054f7f901b8ad97358a9069616ac8524c7 < 1a5c5a2f88e839af5320216a02ffb075b668596a 2d80f4054f7f901b8ad97358a9069616ac8524c7 < b518e86d1a70a88f6592a7c396cf1b93493d1aab
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/7dfa5a5516ec3c6b9b6c22ee18f0eb2df3f38ef2 git.kernel.org: https://git.kernel.org/stable/c/6d2390653d82cad0e1ba2676e536dd99678f6ef1 git.kernel.org: https://git.kernel.org/stable/c/eccc02ba1747501d92bb2049e3ce378ba372f641 git.kernel.org: https://git.kernel.org/stable/c/4e1acf1b6dd6dd0495bda139daafd7a403ae2dc1 git.kernel.org: https://git.kernel.org/stable/c/1a5c5a2f88e839af5320216a02ffb075b668596a git.kernel.org: https://git.kernel.org/stable/c/b518e86d1a70a88f6592a7c396cf1b93493d1aab