CVE-2025-38300

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38300
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38300.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38300
Downstream
Related
Published
2025-07-10T08:15:28Z
Modified
2025-08-12T21:01:38Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

crypto: sun8i-ce-cipher - fix error handling in sun8icecipher_prepare()

Fix two DMA cleanup issues on the error path in sun8icecipher_prepare():

1] If dmamapsg() fails for areq->dst, the device driver would try to free DMA memory it has not allocated in the first place. To fix this, on the "theend_sgs" error path, call dma unmap only if the corresponding dma map was successful.

2] If the dmamapsingle() call for the IV fails, the device driver would try to free an invalid DMA memory address on the "theendiv" path: ------------[ cut here ]------------ DMA-API: sun8i-ce 1904000.crypto: device driver tries to free an invalid DMA memory address WARNING: CPU: 2 PID: 69 at kernel/dma/debug.c:968 checkunmap+0x123c/0x1b90 Modules linked in: skcipherexample(O+) CPU: 2 UID: 0 PID: 69 Comm: 1904000.crypto- Tainted: G O 6.15.0-rc3+ #24 PREEMPT Tainted: [O]=OOTMODULE Hardware name: OrangePi Zero2 (DT) pc : checkunmap+0x123c/0x1b90 lr : checkunmap+0x123c/0x1b90 ... Call trace: checkunmap+0x123c/0x1b90 (P) debugdmaunmappage+0xac/0xc0 dmaunmappageattrs+0x1f4/0x5fc sun8icecipherdoone+0x1bd4/0x1f40 cryptopumpwork+0x334/0x6e0 kthreadworkerfn+0x21c/0x438 kthread+0x374/0x664 retfrom_fork+0x10/0x20 ---[ end trace 0000000000000000 ]---

To fix this, check for !dmamappingerror() before calling dmaunmapsingle() on the "theend_iv" path.

References

Affected packages