In the Linux kernel, the following vulnerability has been resolved:
crypto: acomp - Fix CFI failure due to type punning
To avoid a crash when control flow integrity is enabled, make the
workspace ("stream") free function use a consistent type, and call it
through a function pointer that has that same type.
References
Configurations
History
25 Nov 2025, 19:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/7ec68c59461ca846aab9b7c2b39f63ac7c8a43cf - Patch | |
| References | () https://git.kernel.org/stable/c/962ddc5a7a4b04c007bba0f3e7298cda13c62efd - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux linux Kernel
Linux |
Information
Published : 2025-09-11 17:15
Updated : 2025-11-25 19:09
NVD link : CVE-2025-39777
Mitre link : CVE-2025-39777
CVE.ORG link : CVE-2025-39777
JSON object : View
Products Affected
linux
- linux_kernel
CWE
