CVE-2025-21957
Qualogy qla1280 Null Pointer Dereference Vulnerability
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: qla1280: Fix kernel oops when debug level > 2 A null dereference or oops exception will eventually occur when qla1280.c driver is compiled with DEBUG_QLA1280 enabled and ql_debug_level > 2. I think its clear from the code that the intention here is sg_dma_len(s) not length of sg_next(s) when printing the debug info.
INFO
Published Date :
April 1, 2025, 4:15 p.m.
Last Modified :
April 11, 2025, 5:06 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|---|
CVSS 3.1 | MEDIUM | [email protected] |
Solution
- Update the Linux kernel to the latest version.
- Recompile the kernel with the fix applied.
- Ensure ql_debug_level is set appropriately.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-21957
.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-21957
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-21957
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-21957
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2025-21957
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Apr. 11, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE CWE-476 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.132 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.13 up to (excluding) 6.13.8 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.84 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.12.20 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.180 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 5.4.292 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.236 Added Reference Type kernel.org: https://git.kernel.org/stable/c/11a8dac1177a596648a020a7f3708257a2f95fee Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/24602e2664c515a4f2950d7b52c3d5997463418c Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/5233e3235dec3065ccc632729675575dbe3c6b8a Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/7ac2473e727d67a38266b2b7e55c752402ab588c Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/af71ba921d08c241a817010f96458dc5e5e26762 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/afa27b7c17a48e01546ccaad0ab017ad0496a522 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/c737e2a5fb7f90b96a96121da1b50a9c74ae9b8c Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/ea371d1cdefb0951c7127a33bcd7eb931cf44571 Types: Patch -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Apr. 10, 2025
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/11a8dac1177a596648a020a7f3708257a2f95fee Added Reference https://git.kernel.org/stable/c/afa27b7c17a48e01546ccaad0ab017ad0496a522 Added Reference https://git.kernel.org/stable/c/c737e2a5fb7f90b96a96121da1b50a9c74ae9b8c -
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Apr. 01, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: scsi: qla1280: Fix kernel oops when debug level > 2 A null dereference or oops exception will eventually occur when qla1280.c driver is compiled with DEBUG_QLA1280 enabled and ql_debug_level > 2. I think its clear from the code that the intention here is sg_dma_len(s) not length of sg_next(s) when printing the debug info. Added Reference https://git.kernel.org/stable/c/24602e2664c515a4f2950d7b52c3d5997463418c Added Reference https://git.kernel.org/stable/c/5233e3235dec3065ccc632729675575dbe3c6b8a Added Reference https://git.kernel.org/stable/c/7ac2473e727d67a38266b2b7e55c752402ab588c Added Reference https://git.kernel.org/stable/c/af71ba921d08c241a817010f96458dc5e5e26762 Added Reference https://git.kernel.org/stable/c/ea371d1cdefb0951c7127a33bcd7eb931cf44571