CVE-2025-39841

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

20 Jan 2026, 15:30

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
CWE CWE-787
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/367cb5ffd8a8a4c85dc89f55e7fa7cc191425b11 - () https://git.kernel.org/stable/c/367cb5ffd8a8a4c85dc89f55e7fa7cc191425b11 - Patch
References () https://git.kernel.org/stable/c/55658c7501467ca9ef3bd4453dd920010db8bc13 - () https://git.kernel.org/stable/c/55658c7501467ca9ef3bd4453dd920010db8bc13 - Patch
References () https://git.kernel.org/stable/c/897f64b01c1249ac730329b83f4f40bab71e86c7 - () https://git.kernel.org/stable/c/897f64b01c1249ac730329b83f4f40bab71e86c7 - Patch
References () https://git.kernel.org/stable/c/95b63d15fce5c54a73bbf195e1aacb5a75b128e2 - () https://git.kernel.org/stable/c/95b63d15fce5c54a73bbf195e1aacb5a75b128e2 - Patch
References () https://git.kernel.org/stable/c/9dba9a45c348e8460da97c450cddf70b2056deb3 - () https://git.kernel.org/stable/c/9dba9a45c348e8460da97c450cddf70b2056deb3 - Patch
References () https://git.kernel.org/stable/c/ab34084f42ee06a9028d67c78feafb911d33d111 - () https://git.kernel.org/stable/c/ab34084f42ee06a9028d67c78feafb911d33d111 - Patch
References () https://git.kernel.org/stable/c/baa39f6ad79d372a6ce0aa639fbb2f1578479f57 - () https://git.kernel.org/stable/c/baa39f6ad79d372a6ce0aa639fbb2f1578479f57 - Patch
References () https://git.kernel.org/stable/c/d96cc9a1b57725930c60b607423759d563b4d900 - () https://git.kernel.org/stable/c/d96cc9a1b57725930c60b607423759d563b4d900 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

19 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-19 16:15

Updated : 2026-01-20 15:30


NVD link : CVE-2025-39841

Mitre link : CVE-2025-39841

CVE.ORG link : CVE-2025-39841


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write