CVE-2025-40109
Description
In the Linux kernel, the following vulnerability has been resolved:
crypto: rng - Ensure set_ent is always present
Ensure that set_ent is always set since only drbg provides it.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing set_ent callback in the Linux kernel's crypto RNG subsystem could cause a NULL pointer dereference; the fix ensures the callback is always present.
Vulnerability
CVE-2025-40109 is a bug in the Linux kernel's cryptographic random number generator (RNG) subsystem. The root cause is that the set_entropy source callback set_ent` was not guaranteed to be present for all RNG implementations other than the Deterministic Random Bit Generator (DRBG). When a non-DRBG RNG was used, the kernel could attempt to call a NULL function pointer, leading to a NULL pointer dereference [1].
Exploitation
An attacker would need to be able to trigger the use of an RNG that lacks the set_ent callback. This could be achieved by loading or selecting a specific crypto RNG algorithm that does not provide this callback. The attack does not require special privileges beyond the ability to interact with the kernel's crypto subsystem, but the exact prerequisites depend on the system configuration [2].
Impact
A successful exploitation results in a kernel NULL pointer dereference, which typically causes a system crash (denial of service). In some cases, it might be leveraged for privilege escalation or other impacts, but the primary consequence is system instability [3].
Mitigation
The fix has been applied to the Linux kernel stable tree. Users should update to a kernel version that includes the commit that ensures set_ent is always set [4]. No workaround is available other than applying the patch [4].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
815d6f42da1bbbd903c25b65217acbcd44fe8ab172f4f4262c5c703b50e91e247a7d138e5915cb75983bcc0d36727bf39Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- git.kernel.org/stable/c/15d6f42da1bb527629d8e1067b1302d58dec9166nvd
- git.kernel.org/stable/c/17acbcd44fe8dc17dc1072375e76df2d52da6ac8nvd
- git.kernel.org/stable/c/915cb75983bc5e8b80f8a2f25a4af463f7b18c14nvd
- git.kernel.org/stable/c/ab172f4f42626549b02bada05f09e3f2b0cc26ecnvd
- git.kernel.org/stable/c/bd903c25b652c331831226cdf56c8179d18e43f4nvd
- git.kernel.org/stable/c/c0d36727bf39bb16ef0a67ed608e279535ebf0danvd
- git.kernel.org/stable/c/c5c703b50e91dd4748769f4c5ab50d9ad60be370nvd
- git.kernel.org/stable/c/e247a7d138e514a40edda7c4d72c8bd49bb2cad3nvd
News mentions
0No linked articles in our index yet.