In the Linux kernel, the following vulnerability has been resolved:
scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue
When the task management thread processes reply queues while the reset
thread resets them, the task management thread accesses an invalid queue ID
(0xFFFF), set by the reset thread, which points to unallocated memory,
causing a crash.
Add flag 'io_admin_reset_sync' to synchronize access between the reset,
I/O, and admin threads. Before a reset, the reset handler sets this flag to
block I/O and admin processing threads. If any thread bypasses the initial
check, the reset thread waits up to 10 seconds for processing to finish. If
the wait exceeds 10 seconds, the controller is marked as unrecoverable.
References
Configurations
Configuration 1 (hide)
|
History
12 Nov 2025, 20:12
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-416 | |
| First Time |
Linux
Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| References | () https://git.kernel.org/stable/c/65ba18c84dbd03afe9b38c06c151239d97a09834 - Patch | |
| References | () https://git.kernel.org/stable/c/75b67dca4195e11ccf966a704787b2aa2754a457 - Patch | |
| References | () https://git.kernel.org/stable/c/8d310d66e2b0f5f9f709764641647e8a3a4924fa - Patch | |
| References | () https://git.kernel.org/stable/c/f195fc060c738d303a21fae146dbf85e1595fb4c - Patch |
12 May 2025, 17:32
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
09 May 2025, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-09 07:16
Updated : 2025-11-12 20:12
NVD link : CVE-2025-37861
Mitre link : CVE-2025-37861
CVE.ORG link : CVE-2025-37861
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
