vulnerability
Ubuntu: (CVE-2025-40022): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:L/Au:S/C:N/I:C/A:C) | Oct 24, 2025 | Nov 4, 2025 | Jan 14, 2026 |
Description
In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Fix incorrect boolean values in af_alg_ctx Commit 1b34cbbf4f01 ("crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg") changed some fields from bool to 1-bit bitfields of type u32. However, some assignments to these fields, specifically 'more' and 'merge', assign values greater than 1. These relied on C's implicit conversion to bool, such that zero becomes false and nonzero becomes true. With a 1-bit bitfields of type u32 instead, mod 2 of the value is taken instead, resulting in 0 being assigned in some cases when 1 was intended. Fix this by restoring the bool type.
Solutions
References
- CVE-2025-40022
- https://attackerkb.com/topics/CVE-2025-40022
- URL-https://git.kernel.org/linus/d0ca0df179c4b21e2a6c4a4fb637aa8fa14575cb
- URL-https://git.kernel.org/stable/c/316b090c2fee964c307a634fecc7df269664b158
- URL-https://git.kernel.org/stable/c/3a21698ace915a445bce2d0dcfc84b6d2199baf7
- URL-https://git.kernel.org/stable/c/54506c6335690f4ef1b9f154e34f5a604c72c1ed
- URL-https://git.kernel.org/stable/c/8703940bd30b5ad94408d28d7192db2491cd3592
- URL-https://git.kernel.org/stable/c/d0ca0df179c4b21e2a6c4a4fb637aa8fa14575cb
- URL-https://git.kernel.org/stable/c/d382d6daf0184490f366562469a5673f65ee2662
- URL-https://git.kernel.org/stable/c/fbe96bd25423e61273d8831e995260b429d850b6
- URL-https://www.cve.org/CVERecord?id=CVE-2025-40022
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.