Логотип exploitDog
bind:CVE-2025-39841
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-39841

Количество 26

Количество 26

ubuntu логотип

CVE-2025-39841

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

EPSS: Низкий
redhat логотип

CVE-2025-39841

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-39841

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

EPSS: Низкий
msrc логотип

CVE-2025-39841

3 месяца назад

scsi: lpfc: Fix buffer free/clear order in deferred receive path

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-39841

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: s ...

EPSS: Низкий
github логотип

GHSA-j8p6-qx4r-877v

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

EPSS: Низкий
fstec логотип

BDU:2025-14116

3 месяца назад

Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
rocky логотип

RLSA-2025:19102

около 2 месяцев назад

Moderate: kernel security update

EPSS: Низкий
rocky логотип

RLSA-2025:18318

около 2 месяцев назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19102

около 2 месяцев назад

ELSA-2025-19102: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-18318

2 месяца назад

ELSA-2025-18318: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-18281

2 месяца назад

ELSA-2025-18281: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-25755

около 1 месяца назад

ELSA-2025-25755: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21118

18 дней назад

ELSA-2025-21118: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21112

25 дней назад

ELSA-2025-21112: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-25757

около 1 месяца назад

ELSA-2025-25757: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-25754

около 1 месяца назад

ELSA-2025-25754: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4189-1

26 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4128-1

около 1 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:4301-1

22 дня назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-39841

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-39841

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

CVSS3: 7
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-39841

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-39841

scsi: lpfc: Fix buffer free/clear order in deferred receive path

CVSS3: 7.8
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-39841

In the Linux kernel, the following vulnerability has been resolved: s ...

0%
Низкий
3 месяца назад
github логотип
GHSA-j8p6-qx4r-877v

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.

0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-14116

Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
3 месяца назад
rocky логотип
RLSA-2025:19102

Moderate: kernel security update

около 2 месяцев назад
rocky логотип
RLSA-2025:18318

Moderate: kernel security update

около 2 месяцев назад
oracle-oval логотип
ELSA-2025-19102

ELSA-2025-19102: kernel security update (MODERATE)

около 2 месяцев назад
oracle-oval логотип
ELSA-2025-18318

ELSA-2025-18318: kernel security update (MODERATE)

2 месяца назад
oracle-oval логотип
ELSA-2025-18281

ELSA-2025-18281: kernel security update (MODERATE)

2 месяца назад
oracle-oval логотип
ELSA-2025-25755

ELSA-2025-25755: Unbreakable Enterprise kernel security update (IMPORTANT)

около 1 месяца назад
oracle-oval логотип
ELSA-2025-21118

ELSA-2025-21118: kernel security update (MODERATE)

18 дней назад
oracle-oval логотип
ELSA-2025-21112

ELSA-2025-21112: kernel security update (MODERATE)

25 дней назад
oracle-oval логотип
ELSA-2025-25757

ELSA-2025-25757: Unbreakable Enterprise kernel security update (IMPORTANT)

около 1 месяца назад
oracle-oval логотип
ELSA-2025-25754

ELSA-2025-25754: Unbreakable Enterprise kernel security update (IMPORTANT)

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4189-1

Security update for the Linux Kernel

26 дней назад
suse-cvrf логотип
SUSE-SU-2025:4128-1

Security update for the Linux Kernel

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:4301-1

Security update for the Linux Kernel

22 дня назад

Уязвимостей на страницу