CVE-2025-39841
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
19/09/2025
Last modified:
20/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: lpfc: Fix buffer free/clear order in deferred receive path<br />
<br />
Fix a use-after-free window by correcting the buffer release sequence in<br />
the deferred receive path. The code freed the RQ buffer first and only<br />
then cleared the context pointer under the lock. Concurrent paths (e.g.,<br />
ABTS and the repost path) also inspect and release the same pointer under<br />
the lock, so the old order could lead to double-free/UAF.<br />
<br />
Note that the repost path already uses the correct pattern: detach the<br />
pointer under the lock, then free it after dropping the lock. The<br />
deferred path should do the same.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.1 (including) | 5.4.299 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.243 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.192 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.151 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.105 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.46 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.16.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/367cb5ffd8a8a4c85dc89f55e7fa7cc191425b11
- https://git.kernel.org/stable/c/55658c7501467ca9ef3bd4453dd920010db8bc13
- https://git.kernel.org/stable/c/897f64b01c1249ac730329b83f4f40bab71e86c7
- https://git.kernel.org/stable/c/95b63d15fce5c54a73bbf195e1aacb5a75b128e2
- https://git.kernel.org/stable/c/9dba9a45c348e8460da97c450cddf70b2056deb3
- https://git.kernel.org/stable/c/ab34084f42ee06a9028d67c78feafb911d33d111
- https://git.kernel.org/stable/c/baa39f6ad79d372a6ce0aa639fbb2f1578479f57
- https://git.kernel.org/stable/c/d96cc9a1b57725930c60b607423759d563b4d900
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



