CVE-2025-68324
BaseFortify
Publication date: 2025-12-18
Last updated on: 2025-12-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free bug in the Linux kernel's SCSI IMM parallel port host adapter driver. It occurs because a delayed work item (imm_tq) that processes SCSI commands may still be pending or executing when the device is detached and its memory (imm_struct) is freed. If the delayed work function imm_interrupt() accesses this freed memory, it leads to a use-after-free condition, which is a type of memory error caused by accessing memory after it has been deallocated.
How can this vulnerability impact me? :
This vulnerability can cause system instability or crashes due to the use-after-free memory error. It may also lead to unpredictable behavior or potential security risks if an attacker can exploit the race condition to execute arbitrary code or cause denial of service by triggering the bug.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that your Linux kernel is updated to a version where the fix has been applied. The fix involves adding disable_delayed_work_sync() in imm_detach() to properly cancel delayed work before deallocating imm_struct, preventing use-after-free bugs. Applying the latest kernel patches or updates that include this fix is the immediate step to take.