We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38341

eth: fbnic: avoid double free when failing to DMA-map FW msg



Description

In the Linux kernel, the following vulnerability has been resolved: eth: fbnic: avoid double free when failing to DMA-map FW msg The semantics are that caller of fbnic_mbx_map_msg() retains the ownership of the message on error. All existing callers dutifully free the page.

Reserved 2025-04-16 | Published 2025-07-10 | Updated 2025-07-10 | Assigner Linux

Product status

Default status
unaffected

da3cde08209ec1c915195c2331c275397f34a731 before 670179265ad787b9dd8e701601914618b8927755
affected

da3cde08209ec1c915195c2331c275397f34a731 before 0a211e23852019ef55c70094524e87a944accbb5
affected

da3cde08209ec1c915195c2331c275397f34a731 before 5bd1bafd4474ee26f504b41aba11f3e2a1175b88
affected

Default status
affected

6.11
affected

Any version before 6.11
unaffected

6.12.35
unaffected

6.15.4
unaffected

6.16-rc3
unaffected

References

git.kernel.org/...c/670179265ad787b9dd8e701601914618b8927755

git.kernel.org/...c/0a211e23852019ef55c70094524e87a944accbb5

git.kernel.org/...c/5bd1bafd4474ee26f504b41aba11f3e2a1175b88

cve.org (CVE-2025-38341)

nvd.nist.gov (CVE-2025-38341)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38341

Support options

Helpdesk Chat, Email, Knowledgebase