Home

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Double-free fix When the bfad_im_probe() function fails during initialization, the memory pointed to by bfad->im is freed without setting bfad->im to NULL. Subsequently, during driver uninstallation, when the state machine enters the bfad_sm_stopping state and calls the bfad_im_probe_undo() function, it attempts to free the memory pointed to by bfad->im again, thereby triggering a double-free vulnerability. Set bfad->im to NULL if probing fails.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-04 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 684c92bb08a25ed3c0356bc7eb532ed5b19588dd
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 9337c2affbaebe00b75fdf84ea0e2fcf93c140af
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before ba024d92564580bb90ec367248ace8efe16ce815
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 8e03dd9fadf76db5b9799583074a1a2a54f787f1
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 39cfe2c83146aad956318f866d0ee471b7a61fa5
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 13f613228cf3c96a038424cd97aa4d6aadc66294
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 8456f862cb95bcc3a831e1ba87c0c17068be0f3f
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 50d9bd48321038bd6e15af5a454bbcd180cf6f80
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9
affected

Default status
affected

5.4.297 (semver)
unaffected

5.10.241 (semver)
unaffected

5.15.190 (semver)
unaffected

6.1.149 (semver)
unaffected

6.6.103 (semver)
unaffected

6.12.43 (semver)
unaffected

6.15.11 (semver)
unaffected

6.16.2 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/684c92bb08a25ed3c0356bc7eb532ed5b19588dd

git.kernel.org/...c/9337c2affbaebe00b75fdf84ea0e2fcf93c140af

git.kernel.org/...c/ba024d92564580bb90ec367248ace8efe16ce815

git.kernel.org/...c/8e03dd9fadf76db5b9799583074a1a2a54f787f1

git.kernel.org/...c/39cfe2c83146aad956318f866d0ee471b7a61fa5

git.kernel.org/...c/13f613228cf3c96a038424cd97aa4d6aadc66294

git.kernel.org/...c/8456f862cb95bcc3a831e1ba87c0c17068be0f3f

git.kernel.org/...c/50d9bd48321038bd6e15af5a454bbcd180cf6f80

git.kernel.org/...c/add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9

cve.org (CVE-2025-38699)

nvd.nist.gov (CVE-2025-38699)

Download JSON