Home

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix a regression triggered by scsi_host_busy() Commit 995412e23bb2 ("blk-mq: Replace tags->lock with SRCU for tag iterators") introduced the following regression: Call trace: __srcu_read_lock+0x30/0x80 (P) blk_mq_tagset_busy_iter+0x44/0x300 scsi_host_busy+0x38/0x70 ufshcd_print_host_state+0x34/0x1bc ufshcd_link_startup.constprop.0+0xe4/0x2e0 ufshcd_init+0x944/0xf80 ufshcd_pltfrm_init+0x504/0x820 ufs_rockchip_probe+0x2c/0x88 platform_probe+0x5c/0xa4 really_probe+0xc0/0x38c __driver_probe_device+0x7c/0x150 driver_probe_device+0x40/0x120 __driver_attach+0xc8/0x1e0 bus_for_each_dev+0x7c/0xdc driver_attach+0x24/0x30 bus_add_driver+0x110/0x230 driver_register+0x68/0x130 __platform_driver_register+0x20/0x2c ufs_rockchip_pltform_init+0x1c/0x28 do_one_initcall+0x60/0x1e0 kernel_init_freeable+0x248/0x2c4 kernel_init+0x20/0x140 ret_from_fork+0x10/0x20 Fix this regression by making scsi_host_busy() check whether the SCSI host tag set has already been initialized. tag_set->ops is set by scsi_mq_setup_tags() just before blk_mq_alloc_tag_set() is called. This fix is based on the assumption that scsi_host_busy() and scsi_mq_setup_tags() calls are serialized. This is the case in the UFS driver.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-16 | Updated 2025-12-16 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 143257917b836bd5fc434063030fda199e249624
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 804b5b8e3545445450387ae6891262c421c49304
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d579f496681c5136d63cb4fbb685511227e73602
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 5d778778b40bcdfd9f8817fea1ec6ebcbec69c0a
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 47c8b35a1f1d53aac156480cea0a0c5c82919f03
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before e208fb1660c4a43f06b7b66c3ff22dde84ec3990
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before a0b7780602b1b196f47e527fec82166a7e67c4d0
affected

Default status
affected

5.10.247 (semver)
unaffected

5.15.197 (semver)
unaffected

6.1.159 (semver)
unaffected

6.6.118 (semver)
unaffected

6.12.60 (semver)
unaffected

6.17.10 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/143257917b836bd5fc434063030fda199e249624

git.kernel.org/...c/804b5b8e3545445450387ae6891262c421c49304

git.kernel.org/...c/d579f496681c5136d63cb4fbb685511227e73602

git.kernel.org/...c/5d778778b40bcdfd9f8817fea1ec6ebcbec69c0a

git.kernel.org/...c/47c8b35a1f1d53aac156480cea0a0c5c82919f03

git.kernel.org/...c/e208fb1660c4a43f06b7b66c3ff22dde84ec3990

git.kernel.org/...c/a0b7780602b1b196f47e527fec82166a7e67c4d0

cve.org (CVE-2025-68224)

nvd.nist.gov (CVE-2025-68224)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.