Логотип exploitDog
bind:"CVE-2025-39841"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-39841"

Количество 26

Количество 26

ubuntu логотип

CVE-2025-39841

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

EPSS: Низкий
redhat логотип

CVE-2025-39841

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-39841

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

EPSS: Низкий
msrc логотип

CVE-2025-39841

5 месяцев назад

scsi: lpfc: Fix buffer free/clear order in deferred receive path

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-39841

5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: s ...

EPSS: Низкий
github логотип

GHSA-j8p6-qx4r-877v

4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

EPSS: Низкий
fstec логотип

BDU:2025-14116

5 месяцев назад

Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
rocky логотип

RLSA-2025:19102

3 месяца назад

Moderate: kernel security update

EPSS: Низкий
rocky логотип

RLSA-2025:18318

3 месяца назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19102

3 месяца назад

ELSA-2025-19102: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-18318

4 месяца назад

ELSA-2025-18318: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-18281

4 месяца назад

ELSA-2025-18281: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-25755

3 месяца назад

ELSA-2025-25755: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21118

2 месяца назад

ELSA-2025-21118: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21112

2 месяца назад

ELSA-2025-21112: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-25757

3 месяца назад

ELSA-2025-25757: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-25754

3 месяца назад

ELSA-2025-25754: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4189-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4128-1

3 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4301-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-39841

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

0%
Низкий
5 месяцев назад
redhat логотип
CVE-2025-39841

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

CVSS3: 7
0%
Низкий
5 месяцев назад
nvd логотип
CVE-2025-39841

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

0%
Низкий
5 месяцев назад
msrc логотип
CVE-2025-39841

scsi: lpfc: Fix buffer free/clear order in deferred receive path

CVSS3: 7.8
0%
Низкий
5 месяцев назад
debian логотип
CVE-2025-39841

In the Linux kernel, the following vulnerability has been resolved: s ...

0%
Низкий
5 месяцев назад
github логотип
GHSA-j8p6-qx4r-877v

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-14116

Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
5 месяцев назад
rocky логотип
RLSA-2025:19102

Moderate: kernel security update

3 месяца назад
rocky логотип
RLSA-2025:18318

Moderate: kernel security update

3 месяца назад
oracle-oval логотип
ELSA-2025-19102

ELSA-2025-19102: kernel security update (MODERATE)

3 месяца назад
oracle-oval логотип
ELSA-2025-18318

ELSA-2025-18318: kernel security update (MODERATE)

4 месяца назад
oracle-oval логотип
ELSA-2025-18281

ELSA-2025-18281: kernel security update (MODERATE)

4 месяца назад
oracle-oval логотип
ELSA-2025-25755

ELSA-2025-25755: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-21118

ELSA-2025-21118: kernel security update (MODERATE)

2 месяца назад
oracle-oval логотип
ELSA-2025-21112

ELSA-2025-21112: kernel security update (MODERATE)

2 месяца назад
oracle-oval логотип
ELSA-2025-25757

ELSA-2025-25757: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-25754

ELSA-2025-25754: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4189-1

Security update for the Linux Kernel

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4128-1

Security update for the Linux Kernel

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4301-1

Security update for the Linux Kernel

2 месяца назад

Уязвимостей на страницу