In the Linux kernel, the following vulnerability has been resolved:
eth: fbnic: avoid double free when failing to DMA-map FW msg
The semantics are that caller of fbnicmbxmap_msg() retains the ownership of the message on error. All existing callers dutifully free the page.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38341.json",
"cna_assigner": "Linux"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38341.json"
[
{
"id": "CVE-2025-38341-101ae915",
"digest": {
"line_hashes": [
"339123640948766134000670147821707305926",
"104908267362761086148713380153774024555",
"53114609244515579202207463709126814089",
"176965539901785908225483689451398747823",
"264573194882042813155960420276806607563",
"226957047753794806595448145500866860445",
"244918620423750676223312420823064543288"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a211e23852019ef55c70094524e87a944accbb5",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "drivers/net/ethernet/meta/fbnic/fbnic_fw.c"
}
},
{
"id": "CVE-2025-38341-a2d1dd37",
"digest": {
"function_hash": "163422611793973083664369589701747229646",
"length": 973.0
},
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@0a211e23852019ef55c70094524e87a944accbb5",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "drivers/net/ethernet/meta/fbnic/fbnic_fw.c",
"function": "fbnic_mbx_map_msg"
}
}
]