In the Linux kernel, the following vulnerability has been resolved:
scsi: bfa: Double-free fix
When the bfad_im_probe() function fails during initialization, the memory
pointed to by bfad->im is freed without setting bfad->im to NULL.
Subsequently, during driver uninstallation, when the state machine enters
the bfad_sm_stopping state and calls the bfad_im_probe_undo() function,
it attempts to free the memory pointed to by bfad->im again, thereby
triggering a double-free vulnerability.
Set bfad->im to NULL if probing fails.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Jan 2026, 21:52
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-415 | |
| References | () https://git.kernel.org/stable/c/13f613228cf3c96a038424cd97aa4d6aadc66294 - Patch | |
| References | () https://git.kernel.org/stable/c/39cfe2c83146aad956318f866d0ee471b7a61fa5 - Patch | |
| References | () https://git.kernel.org/stable/c/50d9bd48321038bd6e15af5a454bbcd180cf6f80 - Patch | |
| References | () https://git.kernel.org/stable/c/684c92bb08a25ed3c0356bc7eb532ed5b19588dd - Patch | |
| References | () https://git.kernel.org/stable/c/8456f862cb95bcc3a831e1ba87c0c17068be0f3f - Patch | |
| References | () https://git.kernel.org/stable/c/8e03dd9fadf76db5b9799583074a1a2a54f787f1 - Patch | |
| References | () https://git.kernel.org/stable/c/9337c2affbaebe00b75fdf84ea0e2fcf93c140af - Patch | |
| References | () https://git.kernel.org/stable/c/add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9 - Patch | |
| References | () https://git.kernel.org/stable/c/ba024d92564580bb90ec367248ace8efe16ce815 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| CPE | cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.32:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:* |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Sep 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-04 16:15
Updated : 2026-01-07 21:52
NVD link : CVE-2025-38699
Mitre link : CVE-2025-38699
CVE.ORG link : CVE-2025-38699
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-415
Double Free
