-
CVE-2025-38571
- EPSS 0.03%
- Veröffentlicht 19.08.2025 17:15:33
- Zuletzt bearbeitet 20.08.2025 14:40:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix client side handling of tls alerts A security exploit was discovered in NFS over TLS in tls_alert_recv due to its assumption that there is valid data in the msghdr's iterator's kvec. Instead, this patch proposes the rework how control messages are setup and used by sock_recvmsg(). If no control message structure is setup, kTLS layer will read and process TLS data record types. As soon as it encounters a TLS control message, it would return an error. At that point, NFS can setup a kvec backed control buffer and read in the control message such as a TLS alert. Scott found that a msg iterator can advance the kvec pointer as a part of the copy process thus we need to revert the iterator before calling into the tls_alert_recv.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
a55b3d15331859d9fdd261cfa6d34ca2aeb0fb95
Version
dea034b963c8901bdcc3d3880c04f0d75c95112f
Status
affected
Version <
c36b2fbd60e8f9c6f975522130998608880c93be
Version
dea034b963c8901bdcc3d3880c04f0d75c95112f
Status
affected
Version <
3ee397eaaca4fa04db21bb98c8f1d0c6cc525368
Version
dea034b963c8901bdcc3d3880c04f0d75c95112f
Status
affected
Version <
3feada5baf4dc96e151ff2ca54630e1d274e5458
Version
dea034b963c8901bdcc3d3880c04f0d75c95112f
Status
affected
Version <
cc5d59081fa26506d02de2127ab822f40d88bc5a
Version
dea034b963c8901bdcc3d3880c04f0d75c95112f
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.5
Status
affected
Version <
6.5
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.102
Status
unaffected
Version <=
6.12.*
Version
6.12.42
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.057 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|