CVE-2025-38341

In the Linux kernel, the following vulnerability has been resolved: eth: fbnic: avoid double free when failing to DMA-map FW msg The semantics are that caller of fbnic_mbx_map_msg() retains the ownership of the message on error. All existing callers dutifully free the page.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*

History

18 Nov 2025, 12:52

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: eth: fbnic: evita la doble liberación al no poder asignar DMA a FW msg. La semántica es que quien llama a fbnic_mbx_map_msg() conserva la propiedad del mensaje en caso de error. Todos los que llaman liberan la página correctamente.
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/0a211e23852019ef55c70094524e87a944accbb5 - () https://git.kernel.org/stable/c/0a211e23852019ef55c70094524e87a944accbb5 - Patch
References () https://git.kernel.org/stable/c/5bd1bafd4474ee26f504b41aba11f3e2a1175b88 - () https://git.kernel.org/stable/c/5bd1bafd4474ee26f504b41aba11f3e2a1175b88 - Patch
References () https://git.kernel.org/stable/c/670179265ad787b9dd8e701601914618b8927755 - () https://git.kernel.org/stable/c/670179265ad787b9dd8e701601914618b8927755 - Patch
CWE CWE-415
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

10 Jul 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 09:15

Updated : 2025-11-18 12:52


NVD link : CVE-2025-38341

Mitre link : CVE-2025-38341

CVE.ORG link : CVE-2025-38341


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-415

Double Free