-
CVE-2025-40071
- EPSS 0.03%
- Veröffentlicht 28.10.2025 11:48:39
- Zuletzt bearbeitet 30.10.2025 15:05:32
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Don't block input queue by waiting MSC Currently gsm_queue() processes incoming frames and when opening a DLC channel it calls gsm_dlci_open() which calls gsm_modem_update(). If basic mode is used it calls gsm_modem_upd_via_msc() and it cannot block the input queue by waiting the response to come into the same input queue. Instead allow sending Modem Status Command without waiting for remote end to respond. Define a new function gsm_modem_send_initial_msc() for this purpose. As MSC is only valid for basic encoding, it does not do anything for advanced or when convergence layer type 2 is used.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
c36785f9de03df56ff9b8eca30fa681a12b2310d
Version
48473802506d2d6151f59e0e764932b33b53cb3b
Status
affected
Version <
5416e89b81b00443cb03c88df8da097ae091a141
Version
48473802506d2d6151f59e0e764932b33b53cb3b
Status
affected
Version <
c5a2791a7f11939f05f95c01f0aec0c55bbf28d5
Version
48473802506d2d6151f59e0e764932b33b53cb3b
Status
affected
Version <
3cf0b3c243e56bc43be560617416c1d9f301f44c
Version
48473802506d2d6151f59e0e764932b33b53cb3b
Status
affected
Version
920e849b7d23ced84c9d11e11e2449e34973cfb8
Status
affected
Version
e83b4e1540469babeffcfd44a605cf8a61542598
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.18
Status
affected
Version <
5.18
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.112
Status
unaffected
Version <=
6.12.*
Version
6.12.53
Status
unaffected
Version <=
6.17.*
Version
6.17.3
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.059 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|