๐Ÿ” CVE Alert

CVE-2025-38300

UNKNOWN 0.0

crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare() Fix two DMA cleanup issues on the error path in sun8i_ce_cipher_prepare(): 1] If dma_map_sg() fails for areq->dst, the device driver would try to free DMA memory it has not allocated in the first place. To fix this, on the "theend_sgs" error path, call dma unmap only if the corresponding dma map was successful. 2] If the dma_map_single() call for the IV fails, the device driver would try to free an invalid DMA memory address on the "theend_iv" path: ------------[ cut here ]------------ DMA-API: sun8i-ce 1904000.crypto: device driver tries to free an invalid DMA memory address WARNING: CPU: 2 PID: 69 at kernel/dma/debug.c:968 check_unmap+0x123c/0x1b90 Modules linked in: skcipher_example(O+) CPU: 2 UID: 0 PID: 69 Comm: 1904000.crypto- Tainted: G O 6.15.0-rc3+ #24 PREEMPT Tainted: [O]=OOT_MODULE Hardware name: OrangePi Zero2 (DT) pc : check_unmap+0x123c/0x1b90 lr : check_unmap+0x123c/0x1b90 ... Call trace: check_unmap+0x123c/0x1b90 (P) debug_dma_unmap_page+0xac/0xc0 dma_unmap_page_attrs+0x1f4/0x5fc sun8i_ce_cipher_do_one+0x1bd4/0x1f40 crypto_pump_work+0x334/0x6e0 kthread_worker_fn+0x21c/0x438 kthread+0x374/0x664 ret_from_fork+0x10/0x20 ---[ end trace 0000000000000000 ]--- To fix this, check for !dma_mapping_error() before calling dma_unmap_single() on the "theend_iv" path.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 10, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
06f751b613296cc34b86fc83fccaf30d646eb8bc < a0ac3f85b2e3ef529e852f252a70311f9029d5e6 06f751b613296cc34b86fc83fccaf30d646eb8bc < c62b79c1c51303dbcb6edfa4de0ee176f4934c52 06f751b613296cc34b86fc83fccaf30d646eb8bc < 19d267d9fad00d94ad8477899e38ed7c11f33fb6 06f751b613296cc34b86fc83fccaf30d646eb8bc < 4051250e5db489f8ad65fc337e2677b9b568ac72 06f751b613296cc34b86fc83fccaf30d646eb8bc < f31adc3e356f7350d4a4d68c98d3f60f2f6e26b3
Linux / Linux
5.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/a0ac3f85b2e3ef529e852f252a70311f9029d5e6 git.kernel.org: https://git.kernel.org/stable/c/c62b79c1c51303dbcb6edfa4de0ee176f4934c52 git.kernel.org: https://git.kernel.org/stable/c/19d267d9fad00d94ad8477899e38ed7c11f33fb6 git.kernel.org: https://git.kernel.org/stable/c/4051250e5db489f8ad65fc337e2677b9b568ac72 git.kernel.org: https://git.kernel.org/stable/c/f31adc3e356f7350d4a4d68c98d3f60f2f6e26b3 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html