{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-43414","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2026-05-01T14:12:56.008Z","datePublished":"2026-05-08T14:21:51.604Z","dateUpdated":"2026-05-11T22:24:07.774Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T22:24:07.774Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Completely fix fcport double free\n\nIn qla24xx_els_dcmd_iocb() sp->free is set to qla2x00_els_dcmd_sp_free().\nWhen an error happens, this function is called by qla2x00_sp_release(),\nwhen kref_put() releases the first and the last reference.\n\nqla2x00_els_dcmd_sp_free() frees fcport by calling qla2x00_free_fcport().\nDoing it one more time after kref_put() is a bad idea."}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/scsi/qla2xxx/qla_iocb.c"],"versions":[{"version":"4895009c4bb72f71f2e682f1e7d2c2d96e482087","lessThan":"d48ea85463f5b34f7b92ea0a13eddf1ab993da7b","status":"affected","versionType":"git"},{"version":"4895009c4bb72f71f2e682f1e7d2c2d96e482087","lessThan":"c0b7da13a04bd70ef6070bfb9ea85f582294560a","status":"affected","versionType":"git"},{"version":"7861213201838480dc222634c56fb6db113d010d","status":"affected","versionType":"git"},{"version":"3b9d72442adfbc9ddb0f76dd1b03977b3a578b16","status":"affected","versionType":"git"},{"version":"ef23850940d9a52c39936d27254824ccf5e9b6bd","status":"affected","versionType":"git"},{"version":"6c6bf6cacf9461f8d301cfac4f9c175d80cbcc63","status":"affected","versionType":"git"},{"version":"cd10dee1f07a782f5aa05703c55299ca86a85ee4","status":"affected","versionType":"git"},{"version":"b03e626bd6d3f0684f56ee1890d70fc9ca991c04","status":"affected","versionType":"git"},{"version":"282877633b25d67021a34169c5b5519b1d4ef65e","status":"affected","versionType":"git"},{"version":"f85af9f1aa5e2f53694a6cbe72010f754b5ff862","status":"affected","versionType":"git"},{"version":"9b43d2884b54d415caab48878b526dfe2ae9921b","status":"affected","versionType":"git"},{"version":"846fb9f112f618ec6ae181d8dae7961652574774","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/scsi/qla2xxx/qla_iocb.c"],"versions":[{"version":"6.9","status":"affected"},{"version":"0","lessThan":"6.9","status":"unaffected","versionType":"semver"},{"version":"6.19.9","lessThanOrEqual":"6.19.*","status":"unaffected","versionType":"semver"},{"version":"7.0","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.9","versionEndExcluding":"6.19.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.9","versionEndExcluding":"7.0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.154"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.84"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.24"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.154"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.84"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.24"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8.3"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/d48ea85463f5b34f7b92ea0a13eddf1ab993da7b"},{"url":"https://git.kernel.org/stable/c/c0b7da13a04bd70ef6070bfb9ea85f582294560a"}],"title":"scsi: qla2xxx: Completely fix fcport double free","x_generator":{"engine":"bippy-1.2.0"}}}}