CVE-2025-68224
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a regression in the Linux kernel's SCSI core caused by a recent change in the block multi-queue (blk-mq) subsystem. Specifically, a commit replaced a lock mechanism with SRCU for tag iterators, which led to an issue where the function scsi_host_busy() does not properly check if the SCSI host tag set has been initialized before proceeding. This can cause improper behavior during SCSI host operations. The fix involves making scsi_host_busy() verify that the tag set is initialized, relying on the serialization of calls between scsi_host_busy() and scsi_mq_setup_tags(), which is true for the UFS driver.
How can this vulnerability impact me? :
This vulnerability can cause a regression in the SCSI subsystem of the Linux kernel, potentially leading to improper handling of SCSI host busy states. This may result in system instability or malfunction of storage devices using the affected SCSI host drivers, particularly those using the UFS driver. The impact is related to the reliability and correct operation of storage device management.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the regression in scsi_host_busy(). The fix ensures that scsi_host_busy() checks whether the SCSI host tag set has already been initialized, preventing the issue. Applying the latest kernel patches or updates from your Linux distribution that address this issue is recommended.