CVE-2025-38699

HIGH

Linux Kernel < 5.4.297 - Double Free

Title source: rule

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Double-free fix When the bfad_im_probe() function fails during initialization, the memory pointed to by bfad->im is freed without setting bfad->im to NULL. Subsequently, during driver uninstallation, when the state machine enters the bfad_sm_stopping state and calls the bfad_im_probe_undo() function, it attempts to free the memory pointed to by bfad->im again, thereby triggering a double-free vulnerability. Set bfad->im to NULL if probing fails.

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 2.6%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-415
Status published

Affected Products (16)

linux/linux_kernel < 5.4.297
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
debian/debian_linux
linux/Kernel < 5.4.297linux
linux/Kernel < 5.10.241linux
linux/Kernel < 5.15.190linux
linux/Kernel < 6.1.149linux
linux/Kernel < 6.6.103linux
linux/Kernel < 6.12.43linux
linux/Kernel < 6.15.11linux
... and 1 more

Timeline

Published Sep 04, 2025
Tracked Since Feb 18, 2026