{"uuid": "abda15d4-bc17-40c8-a7e6-c37d1c35531d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38575", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12401", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-38575\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: use aead_request_free to match aead_request_alloc\n\nUse aead_request_free() instead of kfree() to properly free memory\nallocated by aead_request_alloc(). This ensures sensitive crypto data\nis zeroed before being freed.\n\ud83d\udccf Published: 2025-04-18T07:01:33.904Z\n\ud83d\udccf Modified: 2025-04-18T07:01:33.904Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/571b342d4688801fc1f6a1934389dac09425dc93\n2. https://git.kernel.org/stable/c/a6b594868268c3a7bfaeced912525cd2c445529a\n3. https://git.kernel.org/stable/c/1de7fec4d3012672e31eeb6679ea60f7ca010ef9\n4. https://git.kernel.org/stable/c/3e341dbd5f5a6e5a558e67da80731dc38a7f758c\n5. https://git.kernel.org/stable/c/aef10ccd74512c52e30c5ee19d0031850973e78d\n6. https://git.kernel.org/stable/c/46caeae23035192b9cc41872c827f30d0233f16e\n7. https://git.kernel.org/stable/c/6171063e9d046ffa46f51579b2ca4a43caef581a", "creation_timestamp": "2025-04-18T07:59:14.000000Z"}