CVE-2025-38341
In the Linux kernel, the following vulnerability has been resolved:
eth: fbnic: avoid double free when failing to DMA-map FW msg
The semantics are that caller of fbnic_mbx_map_msg() retains
the ownership of the message on error. All existing callers
dutifully free the page.
More information : https://git.kernel.org/stable/c/0a211e23852019ef55c70094524e87a944accbb5
