CVE-2025-68324
Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: imm: Fix use-after-free bug caused by unfinished delayed work
The delayed work item 'imm_tq' is initialized in imm_attach() and scheduled via imm_queuecommand() for processing SCSI commands. When the IMM parallel port SCSI host adapter is detached through imm_detach(), the imm_struct device instance is deallocated.
However, the delayed work might still be pending or executing when imm_detach() is called, leading to use-after-free bugs when the work function imm_interrupt() accesses the already freed imm_struct memory.
The race condition can occur as follows:
CPU 0(detach thread) | CPU 1 | imm_queuecommand() | imm_queuecommand_lck() imm_detach() | schedule_delayed_work() kfree(dev) //FREE | imm_interrupt() | dev = container_of(...) //USE dev-> //USE
Add disable_delayed_work_sync() in imm_detach() to guarantee proper cancellation of the delayed work item before imm_struct is deallocated.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free in the Linux kernel's IMM SCSI driver occurs when a delayed work item runs after the device structure is freed during detach.
Vulnerability
CVE-2025-68324 is a use-after-free vulnerability in the Linux kernel's IMM (Iomega MatchMaker) parallel port SCSI host adapter driver. The root cause is a race condition between the detach path and the delayed work item imm_tq. The work item is initialized in imm_attach() and scheduled via imm_queuecommand() to process SCSI commands. When the adapter is detached through imm_detach(), the imm_struct device instance is deallocated with kfree(dev), but the delayed work may still be pending or executing, leading to access of freed memory in the work function imm_interrupt() [1][2][3][4].
Exploitation
An attacker with the ability to trigger SCSI commands on the IMM device and then cause the device to be detached can exploit this race. The attack requires local access to the system and the ability to load/unload the driver or hot-unplug the parallel port device. No special privileges beyond the ability to issue SCSI commands are needed, but the race window is narrow and may require repeated attempts.
Impact
Successful exploitation results in a use-after-free condition, which can lead to memory corruption, system crash (denial of service), or potentially arbitrary code execution in kernel context, depending on the state of the freed memory.
Mitigation
The fix adds a call to disable_delayed_work_sync() in imm_detach() to ensure the delayed work is cancelled before the device structure is freed. The patch has been applied to the Linux kernel stable branches as of versions 4.19, 5.4, 5.10, 5.15, and 6.1 [1][2][3][4]. Users should update to the latest patched kernel version.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.