CVE-2025-71070Improper Update of Reference Count in Linux

Severity
6.4MEDIUM
No vector
EPSS
0.0%
top 92.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 13
Latest updateApr 17

Description

In the Linux kernel, the following vulnerability has been resolved: ublk: clean up user copy references on ublk server exit If a ublk server process releases a ublk char device file, any requests dispatched to the ublk server but not yet completed will retain a ref value of UBLK_REFCOUNT_INIT. Before commit e63d2228ef83 ("ublk: simplify aborting ublk request"), __ublk_fail_req() would decrement the reference count before completing the failed request. However, that commit optimized __ublk_fail

Affected Packages7 packages

Linuxlinux/linux_kernel6.15.06.18.3
Debianlinux/linux_kernel< 6.18.3-1
CVEListV5linux/linuxe63d2228ef831af36f963b3ab8604160cfff84c113456b4f1033d911f8bf3a0a1195656f293ba0f6+3
debiandebian/linux< linux 6.18.3-1 (forky)

🔴Vulnerability Details

3
OSV
ublk: clean up user copy references on ublk server exit2026-01-13
GHSA
GHSA-p797-qv57-j9x8: In the Linux kernel, the following vulnerability has been resolved: ublk: clean up user copy references on ublk server exit If a ublk server process2026-01-13
OSV
CVE-2025-71070: In the Linux kernel, the following vulnerability has been resolved: ublk: clean up user copy references on ublk server exit If a ublk server process r2026-01-13

📋Vendor Advisories

5
Ubuntu
Linux kernel (GCP) vulnerabilities2026-04-17
Ubuntu
Linux kernel (Real-time) vulnerabilities2026-04-17
Ubuntu
Linux kernel vulnerabilities2026-04-16
Red Hat
kernel: ublk: clean up user copy references on ublk server exit2026-01-13
Debian
CVE-2025-71070: linux - In the Linux kernel, the following vulnerability has been resolved: ublk: clean...2025

🕵️Threat Intelligence

1
Wiz
CVE-2025-71070 Impact, Exploitability, and Mitigation Steps | Wiz