CVE-2025-21957

In the Linux kernel, the following vulnerability has been resolved: scsi: qla1280: Fix kernel oops when debug level > 2 A null dereference or oops exception will eventually occur when qla1280.c driver is compiled with DEBUG_QLA1280 enabled and ql_debug_level > 2. I think its clear from the code that the intention here is sg_dma_len(s) not length of sg_next(s) when printing the debug info.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*

History

11 Apr 2025, 17:06

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/11a8dac1177a596648a020a7f3708257a2f95fee - () https://git.kernel.org/stable/c/11a8dac1177a596648a020a7f3708257a2f95fee - Patch
References () https://git.kernel.org/stable/c/24602e2664c515a4f2950d7b52c3d5997463418c - () https://git.kernel.org/stable/c/24602e2664c515a4f2950d7b52c3d5997463418c - Patch
References () https://git.kernel.org/stable/c/5233e3235dec3065ccc632729675575dbe3c6b8a - () https://git.kernel.org/stable/c/5233e3235dec3065ccc632729675575dbe3c6b8a - Patch
References () https://git.kernel.org/stable/c/7ac2473e727d67a38266b2b7e55c752402ab588c - () https://git.kernel.org/stable/c/7ac2473e727d67a38266b2b7e55c752402ab588c - Patch
References () https://git.kernel.org/stable/c/af71ba921d08c241a817010f96458dc5e5e26762 - () https://git.kernel.org/stable/c/af71ba921d08c241a817010f96458dc5e5e26762 - Patch
References () https://git.kernel.org/stable/c/afa27b7c17a48e01546ccaad0ab017ad0496a522 - () https://git.kernel.org/stable/c/afa27b7c17a48e01546ccaad0ab017ad0496a522 - Patch
References () https://git.kernel.org/stable/c/c737e2a5fb7f90b96a96121da1b50a9c74ae9b8c - () https://git.kernel.org/stable/c/c737e2a5fb7f90b96a96121da1b50a9c74ae9b8c - Patch
References () https://git.kernel.org/stable/c/ea371d1cdefb0951c7127a33bcd7eb931cf44571 - () https://git.kernel.org/stable/c/ea371d1cdefb0951c7127a33bcd7eb931cf44571 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-476

10 Apr 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/11a8dac1177a596648a020a7f3708257a2f95fee -
  • () https://git.kernel.org/stable/c/afa27b7c17a48e01546ccaad0ab017ad0496a522 -
  • () https://git.kernel.org/stable/c/c737e2a5fb7f90b96a96121da1b50a9c74ae9b8c -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qla1280: Se corrige el error del kernel cuando el nivel de depuración > 2. Eventualmente, se producirá una desreferencia nula o una excepción de error cuando el controlador qla1280.c se compila con DEBUG_QLA1280 habilitado y ql_debug_level > 2. Creo que del código se desprende claramente que la intención aquí es sg_dma_len(s), no la longitud de sg_next(s) al imprimir la información de depuración.

01 Apr 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 16:15

Updated : 2025-04-11 17:06


NVD link : CVE-2025-21957

Mitre link : CVE-2025-21957

CVE.ORG link : CVE-2025-21957


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference