PT-2025-31084 · Linux · Linux Kernel
Published
2025-07-28
·
Updated
2025-07-28
·
CVE-2025-38488
None
**Name of the Vulnerable Software and Affected Versions:**
Linux kernel (affected versions not specified)
**Description:**
A use-after-free condition exists in the SMB client within the Linux kernel's `crypt message()` function when asynchronous cryptography is utilized. The initial fix for CVE-2024-50047 removed asynchronous crypto handling, assuming all crypto operations were synchronous. However, hardware crypto accelerators can still trigger asynchronous operations, leading to the premature freeing of the request buffer while the operation is still in progress. Subsequently, accessing this freed memory results in kernel crashes due to NULL pointer dereferences. The issue arises because `crypto alloc aead()` with a mask of 0 does not guarantee synchronous operation, and asynchronous implementations can be selected even without `CRYPTO ALG ASYNC` in the mask.
**Recommendations:**
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Related Identifiers
Affected Products
References · 8
- https://nvd.nist.gov/vuln/detail/CVE-2025-38488 · Security Note
- https://git.kernel.org/stable/c/15a0a5de49507062bc3be4014a403d8cea5533de · Note
- https://git.kernel.org/stable/c/9a1d3e8d40f151c2d5a5f40c410e6e433f62f438 · Note
- https://git.kernel.org/stable/c/8ac90f6824fc44d2e55a82503ddfc95defb19ae0 · Note
- https://git.kernel.org/stable/c/2a76bc2b24ed889a689fb1c9015307bf16aafb5b · Note
- https://git.kernel.org/stable/c/b220bed63330c0e1733dc06ea8e75d5b9962b6b6 · Note
- https://twitter.com/CVEnew/status/1949799968199627245 · Twitter Post
- https://t.me/CVEtracker/28561 · Telegram Post