CVE-2025-38699
HIGHLinux Kernel < 5.4.297 - Double Free
Title source: ruleDescription
In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Double-free fix When the bfad_im_probe() function fails during initialization, the memory pointed to by bfad->im is freed without setting bfad->im to NULL. Subsequently, during driver uninstallation, when the state machine enters the bfad_sm_stopping state and calls the bfad_im_probe_undo() function, it attempts to free the memory pointed to by bfad->im again, thereby triggering a double-free vulnerability. Set bfad->im to NULL if probing fails.
References (11)
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
2.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-415
Status
published
Affected Products (16)
linux/linux_kernel
< 5.4.297
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
debian/debian_linux
linux/Kernel
< 5.4.297linux
linux/Kernel
< 5.10.241linux
linux/Kernel
< 5.15.190linux
linux/Kernel
< 6.1.149linux
linux/Kernel
< 6.6.103linux
linux/Kernel
< 6.12.43linux
linux/Kernel
< 6.15.11linux
... and 1 more
Timeline
Published
Sep 04, 2025
Tracked Since
Feb 18, 2026