CVE-2025-68818
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's qla2xxx SCSI driver. A recent code change removed a spinlock when completing commands in the abort path, assuming a specific command type (TYPE_SRB). However, this assumption was incorrect for target-mode commands (TYPE_TGT_CMD), leading to a jump to an invalid pointer and causing a kernel NULL pointer dereference crash. The issue was fixed by reverting the problematic commit and restoring proper locking and command type checks.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference when handling certain SCSI commands in target mode. This can lead to system instability, unexpected reboots, or denial of service, impacting availability of the affected system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for specific error messages related to the qla2xxx driver. Look for kernel NULL pointer dereference errors, ISP system errors, and messages such as 'qla_target(0): System error async event 0x8002 occurred' or 'Performing ISP error recovery'. Commands like 'dmesg | grep qla2xxx' or 'journalctl -k | grep qla2xxx' can help identify these errors in the system logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the vulnerable commit has been reverted and the fix applied. This ensures that the spinlock is properly held during command completion in the abort path, preventing the race condition and crash. If updating is not immediately possible, consider disabling the qla2xxx driver or the target mode functionality if not in use, to avoid triggering the vulnerable code path.