CVE-2025-68745
Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Clear cmds after chip reset
Commit aefed3e5548f ("scsi: qla2xxx: target: Fix offline port handling and host reset handling") caused two problems:
1. Commands sent to FW, after chip reset got stuck and never freed as FW is not going to respond to them anymore.
2. BUG_ON(cmd->sg_mapped) in qlt_free_cmd(). Commit 26f9ce53817a ("scsi: qla2xxx: Fix missed DMA unmap for aborted commands") attempted to fix this, but introduced another bug under different circumstances when two different CPUs were racing to call qlt_unmap_sg() at the same time: BUG_ON(!valid_dma_direction(dir)) in dma_unmap_sg_attrs().
So revert "scsi: qla2xxx: Fix missed DMA unmap for aborted commands" and partially revert "scsi: qla2xxx: target: Fix offline port handling and host reset handling" at __qla2x00_abort_all_cmds.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Race condition in qla2xxx driver after chip reset can cause commands stuck or DMA unmapping errors, leading to kernel crash.
Vulnerability
Description
The vulnerability is a race condition in the qla2xxx SCSI driver of the Linux kernel. After a chip reset, commands sent to the firmware become stuck and never freed, causing resource leaks. Additionally, a prior fix introduced a race condition in DMA unmapping, where two CPUs calling qlt_unmap_sg() concurrently could trigger a BUG_ON due to invalid DMA direction.
Attack
Vector and Prerequisites
The vulnerability can be triggered under specific conditions involving a chip reset followed by concurrent command handling. No authentication or network access is required; it can be exploited locally by an unprivileged attacker to cause a denial of service.
Impact
An attacker could cause a kernel panic (BUG_ON) or resource exhaustion, leading to system instability or denial of service. The issue has been addressed by reverting the problematic commit and partially reverting another to properly clear commands after chip reset.
Mitigation
The fix has been applied to the Linux kernel stable tree (see commit [1]). Users should update to the latest kernel version to mitigate this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.