CVE-2025-38300
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's sun8i-ce-cipher driver, where error handling for DMA (Direct Memory Access) cleanup was incorrect. Specifically, if certain DMA mapping functions fail, the driver attempts to free DMA memory that was never allocated or is invalid. This can lead to warnings or errors in the kernel, potentially causing instability or crashes. The fix involves checking if the DMA mapping was successful before attempting to unmap (free) the DMA memory.
How can this vulnerability impact me? :
The impact of this vulnerability could include kernel warnings, instability, or crashes due to improper freeing of DMA memory. This could affect system reliability and potentially cause denial of service if the kernel becomes unstable or crashes when the driver encounters these error conditions.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability relates to error handling in the sun8i-ce-cipher driver in the Linux kernel, specifically involving DMA cleanup issues. Detection would involve monitoring kernel logs for warnings or errors related to DMA unmapping failures. You can check the kernel log for messages similar to 'device driver tries to free an invalid DMA memory address' or warnings from dma debug functions. Suggested commands include: `dmesg | grep -i dma`, `dmesg | grep -i sun8i`, or `journalctl -k | grep -i dma` to look for relevant error messages indicating the issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by correcting error handling in the sun8i_ce_cipher_prepare() function. If updating is not immediately possible, monitoring kernel logs for the described errors and avoiding use of the affected crypto driver on vulnerable hardware may reduce risk. However, the primary fix is applying the patch that checks for dma mapping errors before unmapping DMA memory.