๐Ÿ” CVE Alert

CVE-2025-38699

UNKNOWN 0.0

scsi: bfa: Double-free fix

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Double-free fix When the bfad_im_probe() function fails during initialization, the memory pointed to by bfad->im is freed without setting bfad->im to NULL. Subsequently, during driver uninstallation, when the state machine enters the bfad_sm_stopping state and calls the bfad_im_probe_undo() function, it attempts to free the memory pointed to by bfad->im again, thereby triggering a double-free vulnerability. Set bfad->im to NULL if probing fails.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 4, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 684c92bb08a25ed3c0356bc7eb532ed5b19588dd 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 9337c2affbaebe00b75fdf84ea0e2fcf93c140af 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < ba024d92564580bb90ec367248ace8efe16ce815 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 8e03dd9fadf76db5b9799583074a1a2a54f787f1 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 39cfe2c83146aad956318f866d0ee471b7a61fa5 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 13f613228cf3c96a038424cd97aa4d6aadc66294 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 8456f862cb95bcc3a831e1ba87c0c17068be0f3f 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 50d9bd48321038bd6e15af5a454bbcd180cf6f80 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9
Linux / Linux
2.6.32

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/684c92bb08a25ed3c0356bc7eb532ed5b19588dd git.kernel.org: https://git.kernel.org/stable/c/9337c2affbaebe00b75fdf84ea0e2fcf93c140af git.kernel.org: https://git.kernel.org/stable/c/ba024d92564580bb90ec367248ace8efe16ce815 git.kernel.org: https://git.kernel.org/stable/c/8e03dd9fadf76db5b9799583074a1a2a54f787f1 git.kernel.org: https://git.kernel.org/stable/c/39cfe2c83146aad956318f866d0ee471b7a61fa5 git.kernel.org: https://git.kernel.org/stable/c/13f613228cf3c96a038424cd97aa4d6aadc66294 git.kernel.org: https://git.kernel.org/stable/c/8456f862cb95bcc3a831e1ba87c0c17068be0f3f git.kernel.org: https://git.kernel.org/stable/c/50d9bd48321038bd6e15af5a454bbcd180cf6f80 git.kernel.org: https://git.kernel.org/stable/c/add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html