Количество 26
Количество 26
CVE-2025-39841
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.
CVE-2025-39841
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.
CVE-2025-39841
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.
CVE-2025-39841
scsi: lpfc: Fix buffer free/clear order in deferred receive path
CVE-2025-39841
In the Linux kernel, the following vulnerability has been resolved: s ...
GHSA-j8p6-qx4r-877v
In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.
BDU:2025-14116
Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
RLSA-2025:19102
Moderate: kernel security update
RLSA-2025:18318
Moderate: kernel security update
ELSA-2025-19102
ELSA-2025-19102: kernel security update (MODERATE)
ELSA-2025-18318
ELSA-2025-18318: kernel security update (MODERATE)
ELSA-2025-18281
ELSA-2025-18281: kernel security update (MODERATE)
ELSA-2025-25755
ELSA-2025-25755: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-21118
ELSA-2025-21118: kernel security update (MODERATE)
ELSA-2025-21112
ELSA-2025-21112: kernel security update (MODERATE)
ELSA-2025-25757
ELSA-2025-25757: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-25754
ELSA-2025-25754: Unbreakable Enterprise kernel security update (IMPORTANT)
SUSE-SU-2025:4189-1
Security update for the Linux Kernel
SUSE-SU-2025:4128-1
Security update for the Linux Kernel
SUSE-SU-2025:4301-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-39841 In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same. | 0% Низкий | 3 месяца назад | ||
CVE-2025-39841 In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same. | CVSS3: 7 | 0% Низкий | 3 месяца назад | |
CVE-2025-39841 In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same. | 0% Низкий | 3 месяца назад | ||
CVE-2025-39841 scsi: lpfc: Fix buffer free/clear order in deferred receive path | CVSS3: 7.8 | 0% Низкий | 3 месяца назад | |
CVE-2025-39841 In the Linux kernel, the following vulnerability has been resolved: s ... | 0% Низкий | 3 месяца назад | ||
GHSA-j8p6-qx4r-877v In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same. | 0% Низкий | 3 месяца назад | ||
BDU:2025-14116 Уязвимость компонента scsi ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
RLSA-2025:19102 Moderate: kernel security update | около 2 месяцев назад | |||
RLSA-2025:18318 Moderate: kernel security update | около 2 месяцев назад | |||
ELSA-2025-19102 ELSA-2025-19102: kernel security update (MODERATE) | около 2 месяцев назад | |||
ELSA-2025-18318 ELSA-2025-18318: kernel security update (MODERATE) | 2 месяца назад | |||
ELSA-2025-18281 ELSA-2025-18281: kernel security update (MODERATE) | 2 месяца назад | |||
ELSA-2025-25755 ELSA-2025-25755: Unbreakable Enterprise kernel security update (IMPORTANT) | около 1 месяца назад | |||
ELSA-2025-21118 ELSA-2025-21118: kernel security update (MODERATE) | 18 дней назад | |||
ELSA-2025-21112 ELSA-2025-21112: kernel security update (MODERATE) | 25 дней назад | |||
ELSA-2025-25757 ELSA-2025-25757: Unbreakable Enterprise kernel security update (IMPORTANT) | около 1 месяца назад | |||
ELSA-2025-25754 ELSA-2025-25754: Unbreakable Enterprise kernel security update (IMPORTANT) | около 1 месяца назад | |||
SUSE-SU-2025:4189-1 Security update for the Linux Kernel | 26 дней назад | |||
SUSE-SU-2025:4128-1 Security update for the Linux Kernel | около 1 месяца назад | |||
SUSE-SU-2025:4301-1 Security update for the Linux Kernel | 22 дня назад |
Уязвимостей на страницу