In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix crash during module load unload test
During purex packet handling the driver was incorrectly freeing a
pre-allocated structure. Fix this by skipping that entry.
System crashed with the following stack during a module unload test.
Call Trace:
sbitmap_init_node+0x7f/0x1e0
sbitmap_queue_init_node+0x24/0x150
blk_mq_init_bitmaps+0x3d/0xa0
blk_mq_init_tags+0x68/0x90
blk_mq_alloc_map_and_rqs+0x44/0x120
blk_mq_alloc_set_map_and_rqs+0x63/0x150
blk_mq_alloc_tag_set+0x11b/0x230
scsi_add_host_with_dma.cold+0x3f/0x245
qla2x00_probe_one+0xd5a/0x1b80 [qla2xxx]
Call Trace with slub_debug and debug kernel:
kasan_report_invalid_free+0x50/0x80
__kasan_slab_free+0x137/0x150
slab_free_freelist_hook+0xc6/0x190
kfree+0xe8/0x2e0
qla2x00_free_device+0x3bb/0x5d0 [qla2xxx]
qla2x00_remove_one+0x668/0xcf0 [qla2xxx]
References
Configurations
Configuration 1 (hide)
|
History
23 Sep 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-763 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
First Time |
Linux
Linux linux Kernel |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
Summary |
|
|
References | () https://git.kernel.org/stable/c/0972252450f90db56dd5415a20e2aec21a08d036 - Patch | |
References | () https://git.kernel.org/stable/c/213e57b42537f1a2e5395caa9d7189854133ed12 - Patch | |
References | () https://git.kernel.org/stable/c/67f744f73eba870ab96411d0310e831a4adc3713 - Patch | |
References | () https://git.kernel.org/stable/c/9b7eb92dac240ab3bc83e188d83a3df834b41eb2 - Patch |
26 Feb 2025, 07:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:00
Updated : 2025-09-23 14:15
NVD link : CVE-2022-49160
Mitre link : CVE-2022-49160
CVE.ORG link : CVE-2022-49160
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-763
Release of Invalid Pointer or Reference