CVE-2025-38699

NameCVE-2025-38699
DescriptionIn the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Double-free fix When the bfad_im_probe() function fails during initialization, the memory pointed to by bfad->im is freed without setting bfad->im to NULL. Subsequently, during driver uninstallation, when the state machine enters the bfad_sm_stopping state and calls the bfad_im_probe_undo() function, it attempts to free the memory pointed to by bfad->im again, thereby triggering a double-free vulnerability. Set bfad->im to NULL if probing fails.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)bullseye5.10.223-1vulnerable
bullseye (security)5.10.237-1vulnerable
bookworm6.1.148-1vulnerable
bookworm (security)6.1.147-1vulnerable
trixie6.12.43-1fixed
trixie (security)6.12.41-1vulnerable
forky, sid6.16.7-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcetrixie6.12.43-1
linuxsource(unstable)6.16.3-1

Notes

https://git.kernel.org/linus/add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9 (6.17-rc1)

Search for package or bug name: Reporting problems