CVE-2026-32848
Deferred Deferred - Pending Action
Race Condition in NetBSD cryptodev_op Leads to Double-Free

Publication date: 2026-05-18

Last updated on: 2026-05-18

Assigner: VulnCheck

Description
NetBSD prior to commit ec8451e contains a race condition vulnerability in cryptodev_op() within the opencrypto subsystem that allows local attackers to trigger a double-free condition by concurrently issuing CIOCCRYPT operations on the same session identifier on SMP systems. Attackers can exploit mutable per-operation state embedded in the csession struct to corrupt kernel heap memory.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-18
Last Modified
2026-05-18
Generated
2026-05-20
AI Q&A
2026-05-19
EPSS Evaluated
2026-05-19
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
netbsd netbsd to ec8451e (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-362 The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
CWE-415 The product calls free() twice on the same memory address.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in NetBSD versions prior to a specific commit (ec8451e) and involves a race condition in the cryptodev_op() function within the opencrypto subsystem.

Local attackers can exploit this by concurrently issuing CIOCCRYPT operations on the same session identifier on SMP (Symmetric Multiprocessing) systems, which triggers a double-free condition.

This double-free condition allows attackers to corrupt kernel heap memory by exploiting mutable per-operation state embedded in the csession struct.


How can this vulnerability impact me? :

The vulnerability can lead to corruption of kernel heap memory, which may cause system instability or crashes.

Because it involves a double-free condition triggered by local attackers, it could potentially be used to escalate privileges or execute arbitrary code within the kernel context.

However, exploitation requires local access and concurrent operations on SMP systems, which may limit the attack surface.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart