Impact
This vulnerability originates from the qla2xxx SCSI driver in the Linux kernel. A NULL pointer dereference occurs when the driver attempts to free memory without validating that the pointer is non‑null. If triggered, the kernel will crash, producing a kernel oops and ultimately rebooting the host. The flaw does not provide direct access to arbitrary code or data; its worst consequence is denial of service through system instability.
Affected Systems
The flaw affects systems running the Linux kernel that include the qla2xxx SCSI driver. No specific kernel versions are listed in the advisory, so any kernel build that incorporates the qla2xxx module before the patch is potentially vulnerable.
Risk and Exploitability
The CVSS base score of 5.5 places the flaw in the moderate range, and an EPSS score of <1% suggests it is unlikely to be widely exploited at present. The vulnerability is not in CISA's KEV catalog. Based on the description, it is inferred that exploitation would require an attacker with the ability to send malformed SCSI commands to a qla2xxx device, making it a potential local or remote attack vector depending on the system configuration. Because the crash leads to a reboot, repeated attacks could enable a denial‑of‑service strategy, but no privilege escalation or data disclosure is indicated.
OpenCVE Enrichment
Debian DLA
Debian DSA