CVE-2025-39841

Updated: 2026-02-27 04:23:10.914679

Description:

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix buffer free/clear order in deferred receive path Fix a use-after-free window by correcting the buffer release sequence in the deferred receive path. The code freed the RQ buffer first and only then cleared the context pointer under the lock. Concurrent paths (e.g., ABTS and the repost path) also inspect and release the same pointer under the lock, so the old order could lead to double-free/UAF. Note that the repost path already uses the correct pattern: detach the pointer under the lock, then free it after dropping the lock. The deferred path should do the same.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Released CLSA-2025:1764151168 2025-11-27 10:39:38
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1763731262 2025-11-21 21:29:35
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2025:1763734783 2025-11-21 21:29:37
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Released CLSA-2026:1770032032 2026-02-02 16:17:49
Oracle Linux 7 ELS kernel 3.10.0 7.8 HIGH Not Vulnerable 2026-02-21 22:10:18 CVE‑2025‑39841 only affects the lpfc SCSI driver used with Broadcom/Emulex Fibre Channel HBAs, a...
Oracle Linux 7 ELS kernel-uek 5.4.17 7.8 HIGH Already Fixed 2026-02-04 01:21:02 CVE‑2025‑39841 only affects the lpfc SCSI driver used with Broadcom/Emulex Fibre Channel HBAs, a...
TuxCare 9.6 ESU kernel 5.14.0 7.8 HIGH Already Fixed 2025-12-11 05:30:24
Ubuntu 20.04 ELS linux 5.4.0 7.8 HIGH In Testing 2026-02-05 13:17:55