CVE-2025-40182
Linux Debian vulnerability analysis and mitigation

Overview

CVE-2025-40182 affects the Linux kernel's crypto subsystem, specifically related to the skcipher reqsize handling. The vulnerability was introduced when the cra_reqsize field was added to the crypto_alg struct to replace type-specific reqsize fields. While this change was initially intended for ahash and acomp frameworks, its broader application to all crypto algorithms led to potential issues (Debian Security).

Technical details

The vulnerability stems from improper reqsize handling in the skcipher algorithms. The underlying functions in the algorithm framework were not updated to properly set the reqsize from cra_reqsize, which can result in memory corruptions and crashes. This issue specifically affects the crypto subsystem's skcipher implementation (Debian Security).

Impact

The vulnerability can lead to memory corruptions and system crashes when using affected skcipher algorithms in the Linux kernel's crypto subsystem (Debian Security).

Mitigation and workarounds

The issue has been fixed in various Linux kernel versions including 5.10.223-1 for Debian bullseye, 6.1.148-1 for bookworm, and 6.12.57-1 for trixie. The fix involves adding proper set_reqsize calls in the skcipher init function to properly initialize reqsize for these algorithms in the framework (Debian Security).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67858N/AN/A
  • Linux DebianLinux Debian
  • foomuuri
NoYesJan 08, 2026
CVE-2025-67603N/AN/A
  • Linux DebianLinux Debian
  • foomuuri
NoYesJan 08, 2026
CVE-2025-14017N/AN/A
  • cURLcURL
  • curl
NoYesJan 08, 2026
CVE-2025-15224N/AN/A
  • cURLcURL
  • curl
NoYesJan 06, 2026
CVE-2025-15079N/AN/A
  • cURLcURL
  • curl
NoYesJan 06, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management