CVE-2025-38699
scsi: bfa: Double-free fix
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: scsi: bfa: Double-free fix When the bfad_im_probe() function fails during initialization, the memory pointed to by bfad->im is freed without setting bfad->im to NULL. Subsequently, during driver uninstallation, when the state machine enters the bfad_sm_stopping state and calls the bfad_im_probe_undo() function, it attempts to free the memory pointed to by bfad->im again, thereby triggering a double-free vulnerability. Set bfad->im to NULL if probing fails.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Sep 4, 2025 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 684c92bb08a25ed3c0356bc7eb532ed5b19588dd 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 9337c2affbaebe00b75fdf84ea0e2fcf93c140af 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < ba024d92564580bb90ec367248ace8efe16ce815 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 8e03dd9fadf76db5b9799583074a1a2a54f787f1 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 39cfe2c83146aad956318f866d0ee471b7a61fa5 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 13f613228cf3c96a038424cd97aa4d6aadc66294 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 8456f862cb95bcc3a831e1ba87c0c17068be0f3f 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < 50d9bd48321038bd6e15af5a454bbcd180cf6f80 7725ccfda59715ecf8f99e3b520a0b84cc2ea79e < add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9
Linux / Linux
2.6.32
References
git.kernel.org: https://git.kernel.org/stable/c/684c92bb08a25ed3c0356bc7eb532ed5b19588dd git.kernel.org: https://git.kernel.org/stable/c/9337c2affbaebe00b75fdf84ea0e2fcf93c140af git.kernel.org: https://git.kernel.org/stable/c/ba024d92564580bb90ec367248ace8efe16ce815 git.kernel.org: https://git.kernel.org/stable/c/8e03dd9fadf76db5b9799583074a1a2a54f787f1 git.kernel.org: https://git.kernel.org/stable/c/39cfe2c83146aad956318f866d0ee471b7a61fa5 git.kernel.org: https://git.kernel.org/stable/c/13f613228cf3c96a038424cd97aa4d6aadc66294 git.kernel.org: https://git.kernel.org/stable/c/8456f862cb95bcc3a831e1ba87c0c17068be0f3f git.kernel.org: https://git.kernel.org/stable/c/50d9bd48321038bd6e15af5a454bbcd180cf6f80 git.kernel.org: https://git.kernel.org/stable/c/add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html