CVE-2025-38313

Updated: 2025-12-28 03:52:44.881473

Description:

In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc: fix double-free on mc_dev The blamed commit tried to simplify how the deallocations are done but, in the process, introduced a double-free on the mc_dev variable. In case the MC device is a DPRC, a new mc_bus is allocated and the mc_dev variable is just a reference to one of its fields. In this circumstance, on the error path only the mc_bus should be freed. This commit introduces back the following checkpatch warning which is a false-positive. WARNING: kfree(NULL) is safe and this check is probably not required + if (mc_bus) + kfree(mc_bus);


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH Not Vulnerable 2025-12-29 07:28:30
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2025-12-29 07:28:31
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2025-12-29 07:28:32
CentOS Stream 8 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2025-12-29 07:28:29
Oracle Linux 7 ELS kernel-uek 5.4.17 7.8 HIGH Released CLSA-2025:1757963029 2025-09-16 11:19:46
TuxCare 9.6 ESU kernel 5.14.0 7.8 HIGH Not Vulnerable 2025-12-29 07:28:30
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.8 HIGH Needs Triage 2025-12-28 07:07:15
Ubuntu 18.04 ELS linux 4.15.0 7.8 HIGH Needs Triage 2025-12-28 07:19:01
Ubuntu 20.04 ELS linux 5.4.0 7.8 HIGH Not Vulnerable 2025-12-31 06:51:06