CVE-2025-68324

Source
https://cve.org/CVERecord?id=CVE-2025-68324
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68324.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68324
Downstream
Related
Published
2025-12-18T15:02:49.230Z
Modified
2026-03-12T04:29:53.536766Z
Summary
scsi: imm: Fix use-after-free bug caused by unfinished delayed work
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: imm: Fix use-after-free bug caused by unfinished delayed work

The delayed work item 'immtq' is initialized in immattach() and scheduled via immqueuecommand() for processing SCSI commands. When the IMM parallel port SCSI host adapter is detached through immdetach(), the imm_struct device instance is deallocated.

However, the delayed work might still be pending or executing when immdetach() is called, leading to use-after-free bugs when the work function imminterrupt() accesses the already freed imm_struct memory.

The race condition can occur as follows:

CPU 0(detach thread) | CPU 1 | immqueuecommand() | immqueuecommandlck() immdetach() | scheduledelayedwork() kfree(dev) //FREE | imminterrupt() | dev = containerof(...) //USE dev-> //USE

Add disabledelayedworksync() in immdetach() to guarantee proper cancellation of the delayed work item before imm_struct is deallocated.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68324.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
31ab2aad7a7b7501e904a09bf361e44671f66092
Fixed
48dd41fa2d6c6a0c50e714deeba06ffe7f91961b
Fixed
9e434426cc23ad5e2aad649327b59aea00294b13
Fixed
ab58153ec64fa3fc9aea09ca09dc9322e0b54a7c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68324.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.12
Fixed
6.12.63
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.13
Type
ECOSYSTEM
Events
Introduced
6.18.0
Fixed
6.18.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68324.json"