CVE-2025-38300

In the Linux kernel, the following vulnerability has been resolved: crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare() Fix two DMA cleanup issues on the error path in sun8i_ce_cipher_prepare(): 1] If dma_map_sg() fails for areq->dst, the device driver would try to free DMA memory it has not allocated in the first place. To fix this, on the "theend_sgs" error path, call dma unmap only if the corresponding dma map was successful. 2] If the dma_map_single() call for the IV fails, the device driver would try to free an invalid DMA memory address on the "theend_iv" path: ------------[ cut here ]------------ DMA-API: sun8i-ce 1904000.crypto: device driver tries to free an invalid DMA memory address WARNING: CPU: 2 PID: 69 at kernel/dma/debug.c:968 check_unmap+0x123c/0x1b90 Modules linked in: skcipher_example(O+) CPU: 2 UID: 0 PID: 69 Comm: 1904000.crypto- Tainted: G O 6.15.0-rc3+ #24 PREEMPT Tainted: [O]=OOT_MODULE Hardware name: OrangePi Zero2 (DT) pc : check_unmap+0x123c/0x1b90 lr : check_unmap+0x123c/0x1b90 ... Call trace: check_unmap+0x123c/0x1b90 (P) debug_dma_unmap_page+0xac/0xc0 dma_unmap_page_attrs+0x1f4/0x5fc sun8i_ce_cipher_do_one+0x1bd4/0x1f40 crypto_pump_work+0x334/0x6e0 kthread_worker_fn+0x21c/0x438 kthread+0x374/0x664 ret_from_fork+0x10/0x20 ---[ end trace 0000000000000000 ]--- To fix this, check for !dma_mapping_error() before calling dma_unmap_single() on the "theend_iv" path.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

19 Dec 2025, 17:56

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/19d267d9fad00d94ad8477899e38ed7c11f33fb6 - () https://git.kernel.org/stable/c/19d267d9fad00d94ad8477899e38ed7c11f33fb6 - Patch
References () https://git.kernel.org/stable/c/4051250e5db489f8ad65fc337e2677b9b568ac72 - () https://git.kernel.org/stable/c/4051250e5db489f8ad65fc337e2677b9b568ac72 - Patch
References () https://git.kernel.org/stable/c/a0ac3f85b2e3ef529e852f252a70311f9029d5e6 - () https://git.kernel.org/stable/c/a0ac3f85b2e3ef529e852f252a70311f9029d5e6 - Patch
References () https://git.kernel.org/stable/c/c62b79c1c51303dbcb6edfa4de0ee176f4934c52 - () https://git.kernel.org/stable/c/c62b79c1c51303dbcb6edfa4de0ee176f4934c52 - Patch
References () https://git.kernel.org/stable/c/f31adc3e356f7350d4a4d68c98d3f60f2f6e26b3 - () https://git.kernel.org/stable/c/f31adc3e356f7350d4a4d68c98d3f60f2f6e26b3 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CWE CWE-401
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

10 Jul 2025, 13:17

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: sun8i-ce-cipher - corrección del manejo de errores en sun8i_ce_cipher_prepare(). Se corrigen dos problemas de limpieza de DMA en la ruta de error en sun8i_ce_cipher_prepare(): 1] Si dma_map_sg() falla para areq->dst, el controlador del dispositivo intentaría liberar memoria DMA que no había asignado inicialmente. Para corregir esto, en la ruta de error "theend_sgs", ejecute dma unmap solo si la asignación de DMA correspondiente se realizó correctamente. 2] Si falla la llamada a dma_map_single() para el IV, el controlador del dispositivo intentará liberar una dirección de memoria DMA no válida en la ruta "theend_iv": ------------[ cortar aquí ]------------ DMA-API: sun8i-ce 1904000.crypto: el controlador del dispositivo intenta liberar una dirección de memoria DMA no válida ADVERTENCIA: CPU: 2 PID: 69 en kernel/dma/debug.c:968 check_unmap+0x123c/0x1b90 Módulos vinculados: skcipher_example(O+) CPU: 2 UID: 0 PID: 69 Comm: 1904000.crypto- Tainted: GO 6.15.0-rc3+ #24 PREEMPT Tainted: [O]=OOT_MODULE Nombre del hardware: OrangePi Zero2 (DT) pc : check_unmap+0x123c/0x1b90 lr : check_unmap+0x123c/0x1b90 ... Rastreo de llamada: check_unmap+0x123c/0x1b90 (P) debug_dma_unmap_page+0xac/0xc0 dma_unmap_page_attrs+0x1f4/0x5fc sun8i_ce_cipher_do_one+0x1bd4/0x1f40 crypto_pump_work+0x334/0x6e0 kthread_worker_fn+0x21c/0x438 kthread+0x374/0x664 ret_from_fork+0x10/0x20 ---[ fin del rastreo 000000000000000 ]--- Para solucionar esto, verifique !dma_mapping_error() antes de llamar dma_unmap_single() en la ruta "theend_iv".

10 Jul 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 08:15

Updated : 2025-12-19 17:56


NVD link : CVE-2025-38300

Mitre link : CVE-2025-38300

CVE.ORG link : CVE-2025-38300


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime