CVE-2025-71235

Source
https://cve.org/CVERecord?id=CVE-2025-71235
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71235.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-71235
Downstream
Related
Published
2026-02-18T14:53:20.222Z
Modified
2026-03-28T17:29:23.944718Z
Summary
scsi: qla2xxx: Delay module unload while fabric scan in progress
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Delay module unload while fabric scan in progress

System crash seen during load/unload test in a loop.

[105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086 [105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0 [105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000 [105954.384923] FS: 0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:0000000000000000 [105954.384925] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [105954.384926] CR2: 000055d31ce1d6a0 CR3: 0000000119f5e001 CR4: 0000000000770ee0 [105954.384928] PKRU: 55555554 [105954.384929] Call Trace: [105954.384931] <IRQ> [105954.384934] qla24xxspunmap+0x1f3/0x2a0 [qla2xxx] [105954.384962] ? qlaasyncscanspdone+0x114/0x1f0 [qla2xxx] [105954.384980] ? qla24xxelsct_entry+0x4de/0x760 [qla2xxx] [105954.384999] ? __wakeupcommon+0x80/0x190 [105954.385004] ? qla24xxprocessresponsequeue+0xc2/0xaa0 [qla2xxx] [105954.385023] ? qla24xxmsixrspq+0x44/0xb0 [qla2xxx] [105954.385040] ? __handleirqevent_percpu+0x3d/0x190 [105954.385044] ? handleirqevent+0x58/0xb0 [105954.385046] ? handleedgeirq+0x93/0x240 [105954.385050] ? __commoninterrupt+0x41/0xa0 [105954.385055] ? commoninterrupt+0x3e/0xa0 [105954.385060] ? asmcommoninterrupt+0x22/0x40

The root cause of this was that there was a free (dmafreeattrs) in the interrupt context. There was a device discovery/fabric scan in progress. A module unload was issued which set the UNLOADING flag. As part of the discovery, after receiving an interrupt a work queue was scheduled (which involved a work to be queued). Since the UNLOADING flag is set, the work item was not allocated and the mapped memory had to be freed. The free occurred in interrupt context leading to system crash. Delay the driver unload until the fabric scan is complete to avoid the crash.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71235.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
783e0dc4f66ade6bbd8833b6bae778158d54c1a6
Fixed
d8af012f92eee021c6ebb7093e65813c926c336b
Fixed
891f9969a29e9767a453cef4811c8d2472ccab49
Fixed
984dc1a51bf6fc3ca4e726abe790ec38952935d8
Fixed
528b2f1027edfb52af0171f0f4b227fb356dde05
Fixed
d70f71d4c92bcb8b6a21ac62d4ea3e87721f4f32
Fixed
c068ebbaf52820d6bdefb9b405a1e426663c635a
Fixed
7062eb0c488f35730334daad9495d9265c574853
Fixed
8890bf450e0b6b283f48ac619fca5ac2f14ddd62

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71235.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.8.0
Fixed
5.10.251
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.201
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.164
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.125
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.72
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.11
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71235.json"