Home

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: acomp - Fix CFI failure due to type punning To avoid a crash when control flow integrity is enabled, make the workspace ("stream") free function use a consistent type, and call it through a function pointer that has that same type.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-11 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

42d9f6c774790d290c175e8775ce9f1366438098 (git) before 7ec68c59461ca846aab9b7c2b39f63ac7c8a43cf
affected

42d9f6c774790d290c175e8775ce9f1366438098 (git) before 962ddc5a7a4b04c007bba0f3e7298cda13c62efd
affected

Default status
affected

6.16
affected

Any version before 6.16
unaffected

6.16.4 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/7ec68c59461ca846aab9b7c2b39f63ac7c8a43cf

git.kernel.org/...c/962ddc5a7a4b04c007bba0f3e7298cda13c62efd

cve.org (CVE-2025-39777)

nvd.nist.gov (CVE-2025-39777)

Download JSON