Bug 2396944 (CVE-2025-39841) - CVE-2025-39841 kernel: scsi: lpfc: Fix buffer free/clear order in deferred receive path
Summary: CVE-2025-39841 kernel: scsi: lpfc: Fix buffer free/clear order in deferred re...
Keywords:
Status: NEW
Alias: CVE-2025-39841
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-09-19 16:03 UTC by OSIDB Bzimport
Modified: 2025-11-12 12:22 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:18281 0 None None None 2025-10-20 02:00:48 UTC
Red Hat Product Errata RHSA-2025:18318 0 None None None 2025-10-20 09:49:01 UTC
Red Hat Product Errata RHSA-2025:19102 0 None None None 2025-10-27 09:38:21 UTC
Red Hat Product Errata RHSA-2025:19103 0 None None None 2025-10-27 09:35:51 UTC
Red Hat Product Errata RHSA-2025:21083 0 None None None 2025-11-12 05:14:46 UTC
Red Hat Product Errata RHSA-2025:21084 0 None None None 2025-11-12 05:16:49 UTC
Red Hat Product Errata RHSA-2025:21112 0 None None None 2025-11-12 11:25:31 UTC
Red Hat Product Errata RHSA-2025:21118 0 None None None 2025-11-12 12:22:19 UTC

Description OSIDB Bzimport 2025-09-19 16:03:20 UTC
In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix buffer free/clear order in deferred receive path

Fix a use-after-free window by correcting the buffer release sequence in
the deferred receive path. The code freed the RQ buffer first and only
then cleared the context pointer under the lock. Concurrent paths (e.g.,
ABTS and the repost path) also inspect and release the same pointer under
the lock, so the old order could lead to double-free/UAF.

Note that the repost path already uses the correct pattern: detach the
pointer under the lock, then free it after dropping the lock. The
deferred path should do the same.

Comment 4 errata-xmlrpc 2025-10-20 02:00:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:18281 https://access.redhat.com/errata/RHSA-2025:18281

Comment 5 errata-xmlrpc 2025-10-20 09:49:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:18318 https://access.redhat.com/errata/RHSA-2025:18318

Comment 6 errata-xmlrpc 2025-10-27 09:35:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:19103 https://access.redhat.com/errata/RHSA-2025:19103

Comment 7 errata-xmlrpc 2025-10-27 09:38:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:19102 https://access.redhat.com/errata/RHSA-2025:19102

Comment 8 errata-xmlrpc 2025-11-12 05:14:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2025:21083 https://access.redhat.com/errata/RHSA-2025:21083

Comment 9 errata-xmlrpc 2025-11-12 05:16:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:21084 https://access.redhat.com/errata/RHSA-2025:21084

Comment 10 errata-xmlrpc 2025-11-12 11:25:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:21112 https://access.redhat.com/errata/RHSA-2025:21112

Comment 11 errata-xmlrpc 2025-11-12 12:22:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:21118 https://access.redhat.com/errata/RHSA-2025:21118


Note You need to log in before you can comment on or make changes to this bug.