CVE-2025-38699
Severity CVSS v4.0:
Pending analysis
Type:
CWE-415
Double Free
Publication date:
04/09/2025
Last modified:
07/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: bfa: Double-free fix<br />
<br />
When the bfad_im_probe() function fails during initialization, the memory<br />
pointed to by bfad->im is freed without setting bfad->im to NULL.<br />
<br />
Subsequently, during driver uninstallation, when the state machine enters<br />
the bfad_sm_stopping state and calls the bfad_im_probe_undo() function,<br />
it attempts to free the memory pointed to by bfad->im again, thereby<br />
triggering a double-free vulnerability.<br />
<br />
Set bfad->im to NULL if probing fails.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.33 (including) | 5.4.297 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.149 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.103 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.43 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.32:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.32:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.32:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.32:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.32:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.32:rc8:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/13f613228cf3c96a038424cd97aa4d6aadc66294
- https://git.kernel.org/stable/c/39cfe2c83146aad956318f866d0ee471b7a61fa5
- https://git.kernel.org/stable/c/50d9bd48321038bd6e15af5a454bbcd180cf6f80
- https://git.kernel.org/stable/c/684c92bb08a25ed3c0356bc7eb532ed5b19588dd
- https://git.kernel.org/stable/c/8456f862cb95bcc3a831e1ba87c0c17068be0f3f
- https://git.kernel.org/stable/c/8e03dd9fadf76db5b9799583074a1a2a54f787f1
- https://git.kernel.org/stable/c/9337c2affbaebe00b75fdf84ea0e2fcf93c140af
- https://git.kernel.org/stable/c/add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9
- https://git.kernel.org/stable/c/ba024d92564580bb90ec367248ace8efe16ce815
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



