CVE-2025-71070

Source
https://cve.org/CVERecord?id=CVE-2025-71070
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71070.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-71070
Downstream
Published
2026-01-13T15:31:24.709Z
Modified
2026-04-02T13:04:40.595340Z
Summary
ublk: clean up user copy references on ublk server exit
Details

In the Linux kernel, the following vulnerability has been resolved:

ublk: clean up user copy references on ublk server exit

If a ublk server process releases a ublk char device file, any requests dispatched to the ublk server but not yet completed will retain a ref value of UBLKREFCOUNTINIT. Before commit e63d2228ef83 ("ublk: simplify aborting ublk request"), __ublkfailreq() would decrement the reference count before completing the failed request. However, that commit optimized __ublkfailreq() to call _ublkcompleterq() directly without decrementing the request reference count. The leaked reference count incorrectly allows user copy and zero copy operations on the completed ublk request. It also triggers the WARNONONCE(refcountread(&io->ref)) warnings in ublkqueuereinit() and ublkdeinitqueue(). Commit c5c5eb24ed61 ("ublk: avoid ublkiorelease() called after ublk char dev is closed") already fixed the issue for ublk devices using UBLKFSUPPORTZEROCOPY or UBLKFAUTOBUFREG. However, the reference count leak also affects UBLKFUSERCOPY, the other reference-counted data copy mode. Fix the condition in ublkcheckandresetactiveref() to include all reference-counted data copy modes. This ensures that any ublk requests still owned by the ublk server when it exits have their reference counts reset to 0.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71070.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e63d2228ef831af36f963b3ab8604160cfff84c1
Fixed
13456b4f1033d911f8bf3a0a1195656f293ba0f6
Fixed
daa24603d9f0808929514ee62ced30052ca7221c
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
e537193fc4a43b48ac51cc6366319e15e32dd540

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71070.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.15.0
Fixed
6.18.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71070.json"