-
CVE-2025-40176
- EPSS 0.03%
- Veröffentlicht 12.11.2025 10:53:50
- Zuletzt bearbeitet 12.11.2025 16:19:12
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: tls: wait for pending async decryptions if tls_strp_msg_hold fails Async decryption calls tls_strp_msg_hold to create a clone of the input skb to hold references to the memory it uses. If we fail to allocate that clone, proceeding with async decryption can lead to various issues (UAF on the skb, writing into userspace memory after the recv() call has returned). In this case, wait for all pending decryption requests.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
9f83fd0c179e0f458e824e417f9d5ad53443f685
Version
84c61fe1a75b4255df1e1e7c054c9e6d048da417
Status
affected
Version <
c61d4368197d65c4809d9271f3b85325a600586a
Version
84c61fe1a75b4255df1e1e7c054c9e6d048da417
Status
affected
Version <
39dec4ea3daf77f684308576baf483b55ca7f160
Version
84c61fe1a75b4255df1e1e7c054c9e6d048da417
Status
affected
Version <
4fc109d0ab196bd943b7451276690fb6bb48c2e0
Version
84c61fe1a75b4255df1e1e7c054c9e6d048da417
Status
affected
Version <
b8a6ff84abbcbbc445463de58704686011edc8e1
Version
84c61fe1a75b4255df1e1e7c054c9e6d048da417
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.0
Status
affected
Version <
6.0
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.158
Status
unaffected
Version <=
6.6.*
Version
6.6.114
Status
unaffected
Version <=
6.12.*
Version
6.12.55
Status
unaffected
Version <=
6.17.*
Version
6.17.5
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.064 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|