CVE-2025-40063
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a mismatch in the definition and layout of context allocation and free operations between two related structures in the Linux kernel's crypto subsystem. Specifically, the crypto_acomp_streams struct relies on having alloc_ctx and free_ctx operations in the same order as the scomp_alg struct. However, due to structure layout randomization, the order of these function pointers in scomp_alg may be randomized, causing a mismatch. This can lead to incorrect behavior or potential security issues. The fix ensures both structures share the same definition and layout for these operations, preventing the mismatch.
How can this vulnerability impact me? :
If the alloc_ctx and free_ctx function pointers are mismatched due to structure layout randomization, it could cause incorrect memory allocation or freeing operations within the crypto subsystem. This may lead to instability, crashes, or potentially exploitable conditions in the Linux kernel's cryptographic operations, affecting system security and reliability.