Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-72742.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-72742
Upstream
Published
2025-12-18T15:16:06Z
Modified
2026-04-01T05:22:35.039532Z
Summary
CVE-2025-68324 affecting package kernel 6.6.126.1-1
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: imm: Fix use-after-free bug caused by unfinished delayed work

The delayed work item 'immtq' is initialized in immattach() and scheduled via immqueuecommand() for processing SCSI commands. When the IMM parallel port SCSI host adapter is detached through immdetach(), the imm_struct device instance is deallocated.

However, the delayed work might still be pending or executing when immdetach() is called, leading to use-after-free bugs when the work function imminterrupt() accesses the already freed imm_struct memory.

The race condition can occur as follows:

CPU 0(detach thread) | CPU 1 | immqueuecommand() | immqueuecommandlck() immdetach() | scheduledelayedwork() kfree(dev) //FREE | imminterrupt() | dev = containerof(...) //USE dev-> //USE

Add disabledelayedworksync() in immdetach() to guarantee proper cancellation of the delayed work item before imm_struct is deallocated.

References

Affected packages

Azure Linux:3 / kernel

Package

Name
kernel
Purl
pkg:rpm/azure-linux/kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
6.6.126.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-72742.json"