Impact
The qla2xxx SCSI driver in the Linux kernel contains a double free bug that can release an fcport resource twice when an error occurs during command processing. Based on the description, it is inferred that this double free can trigger a use‑after‑free condition, potentially causing memory corruption within the kernel. In kernel code, such corruption can result in a kernel panic (denial of service) or provide an attacker with a vector to execute arbitrary code with kernel privileges.
Affected Systems
Linux kernel releases compiled with the legacy qla2xxx driver before the fix commit (c0b7da13a04bd70ef6070bfb9ea85f582294560a) are susceptible. The code path includes qla24xx_els_dcmd_iocb and qla2x00_els_dcmd_sp_free. The driver is used to manage Fibre Channel adapters; while the CVE description does not state the vendor, it can be inferred from the driver name that the hardware is typically QLogic devices. The issue affects systems that use the qla2xxx driver before the fix.
Risk and Exploitability
No EPSS score is publicly available, and the vulnerability is not listed in the CISA KEV catalog. The CVSS score is 5.5, indicating a medium severity vulnerability. Attackers must be able to trigger the error path in the driver; thus the likely attack vector is local privilege escalation, or if an attacker can gain direct access to the Fibre Channel controller, a remote attack via the storage network is possible. This inference is based on the description of a double free in the driver, which suggests that an attacker could trigger the error path with locally executed code or through storage network traffic.
OpenCVE Enrichment