CVE-2025-71238

Source
https://cve.org/CVERecord?id=CVE-2025-71238
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71238.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-71238
Downstream
Related
Published
2026-03-04T14:36:36.579Z
Modified
2026-05-18T05:58:22.316642643Z
Summary
scsi: qla2xxx: Fix bsg_done() causing double free
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix bsg_done() causing double free

Kernel panic observed on system,

[5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000 [5353358.825194] #PF: supervisor write access in kernel mode [5353358.825195] #PF: errorcode(0x0002) - not-present page [5353358.825196] PGD 100006067 P4D 0 [5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI [5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el95.x8664 #1 [5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025 [5353358.825204] RIP: 0010:memcpyerms+0x6/0x10 [5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246 [5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000 [5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000 [5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000 [5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090 [5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000 [5353358.825218] FS: 00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000 [5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0 [5353358.825221] PKRU: 55555554 [5353358.825222] Call Trace: [5353358.825223] <TASK> [5353358.825224] ? showtraceloglvl+0x1c4/0x2df [5353358.825229] ? showtraceloglvl+0x1c4/0x2df [5353358.825232] ? sgcopybuffer+0xc8/0x110 [5353358.825236] ? _diebody.cold+0x8/0xd [5353358.825238] ? pagefaultoops+0x134/0x170 [5353358.825242] ? kernelmodefixuporoops+0x84/0x110 [5353358.825244] ? excpagefault+0xa8/0x150 [5353358.825247] ? asmexcpagefault+0x22/0x30 [5353358.825252] ? memcpyerms+0x6/0x10 [5353358.825253] sgcopybuffer+0xc8/0x110 [5353358.825259] qla2x00processvendorspecific+0x652/0x1320 [qla2xxx] [5353358.825317] qla24xxbsgrequest+0x1b2/0x2d0 [qla2xxx]

Most routines in qlabsg.c call bsgdone() only for success cases. However a few invoke it for failure case as well leading to a double free. Validate before calling bsg_done().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71238.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1b81e7f3019d632a707e07927e946ffbbc102910
Fixed
057a5bdc481e58ab853117254867ffb22caf9f6e
Fixed
f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720
Fixed
27ac9679c43a09e54e2d9aae9980ada045b428e0
Fixed
74e7458537cd9349cf019862e51491f670871707
Fixed
871f6236da96c4a9712b8a29d7f555f767a47e95
Fixed
31f33b856d2324d86bcaef295f4d210477a1c018
Fixed
708003e1bc857dd014d4c44278d7d77c26f91b1c
Fixed
c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71238.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.7.0
Fixed
5.10.251
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.201
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.164
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.127
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.74
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.13
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71238.json"