Количество 37
Количество 37
CVE-2025-39682
In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call must process either - only contiguous DATA records (any number of them) - one non-DATA record If the next record has different type than what has already been processed we break out of the main processing loop. If the record has already been decrypted (which may be the case for TLS 1.3 where we don't know type until decryption) we queue the pending record to the rx_list. Next recvmsg() will pick it up from there. Queuing the skb to rx_list after zero-copy decrypt is not possible, since in that case we decrypted directly to the user space buffer, and we don't have an skb to queue (darg.skb points to the ciphertext skb for access to metadata like length). Only data records are allowed zero-copy, and we break the processing loop after each non-data record. So we should never zero-copy and then find out that the record type has changed. The corn...
CVE-2025-39682
In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call must process either - only contiguous DATA records (any number of them) - one non-DATA record If the next record has different type than what has already been processed we break out of the main processing loop. If the record has already been decrypted (which may be the case for TLS 1.3 where we don't know type until decryption) we queue the pending record to the rx_list. Next recvmsg() will pick it up from there. Queuing the skb to rx_list after zero-copy decrypt is not possible, since in that case we decrypted directly to the user space buffer, and we don't have an skb to queue (darg.skb points to the ciphertext skb for access to metadata like length). Only data records are allowed zero-copy, and we break the processing loop after each non-data record. So we should never zero-copy and then find out that the record type has changed. The corn...
CVE-2025-39682
In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call must process either - only contiguous DATA records (any number of them) - one non-DATA record If the next record has different type than what has already been processed we break out of the main processing loop. If the record has already been decrypted (which may be the case for TLS 1.3 where we don't know type until decryption) we queue the pending record to the rx_list. Next recvmsg() will pick it up from there. Queuing the skb to rx_list after zero-copy decrypt is not possible, since in that case we decrypted directly to the user space buffer, and we don't have an skb to queue (darg.skb points to the ciphertext skb for access to metadata like length). Only data records are allowed zero-copy, and we break the processing loop after each non-data record. So we should never zero-copy and then find out that the record type has changed. The
CVE-2025-39682
tls: fix handling of zero-length records on the rx_list
CVE-2025-39682
In the Linux kernel, the following vulnerability has been resolved: t ...
GHSA-v2pf-75pf-9c5h
In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call must process either - only contiguous DATA records (any number of them) - one non-DATA record If the next record has different type than what has already been processed we break out of the main processing loop. If the record has already been decrypted (which may be the case for TLS 1.3 where we don't know type until decryption) we queue the pending record to the rx_list. Next recvmsg() will pick it up from there. Queuing the skb to rx_list after zero-copy decrypt is not possible, since in that case we decrypted directly to the user space buffer, and we don't have an skb to queue (darg.skb points to the ciphertext skb for access to metadata like length). Only data records are allowed zero-copy, and we break the processing loop after each non-data record. So we should never zero-copy and then find out that the record type has changed. T...
BDU:2025-12988
Уязвимость функции recvmsg() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2026:0209-1
Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0203-1
Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0145-1
Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0202-1
Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0146-1
Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7)
ROS-20251202-02
Множественные уязвимости kernel-lt
RLSA-2025:16880
Moderate: kernel security update
ELSA-2025-16880
ELSA-2025-16880: kernel security update (MODERATE)
RLSA-2025:16904
Moderate: kernel security update
ELSA-2025-20608
ELSA-2025-20608: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-16904
ELSA-2025-16904: kernel security update (MODERATE)
SUSE-SU-2026:0284-1
Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0283-1
Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-39682 In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call must process either - only contiguous DATA records (any number of them) - one non-DATA record If the next record has different type than what has already been processed we break out of the main processing loop. If the record has already been decrypted (which may be the case for TLS 1.3 where we don't know type until decryption) we queue the pending record to the rx_list. Next recvmsg() will pick it up from there. Queuing the skb to rx_list after zero-copy decrypt is not possible, since in that case we decrypted directly to the user space buffer, and we don't have an skb to queue (darg.skb points to the ciphertext skb for access to metadata like length). Only data records are allowed zero-copy, and we break the processing loop after each non-data record. So we should never zero-copy and then find out that the record type has changed. The corn... | CVSS3: 7.1 | 0% Низкий | 5 месяцев назад | |
CVE-2025-39682 In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call must process either - only contiguous DATA records (any number of them) - one non-DATA record If the next record has different type than what has already been processed we break out of the main processing loop. If the record has already been decrypted (which may be the case for TLS 1.3 where we don't know type until decryption) we queue the pending record to the rx_list. Next recvmsg() will pick it up from there. Queuing the skb to rx_list after zero-copy decrypt is not possible, since in that case we decrypted directly to the user space buffer, and we don't have an skb to queue (darg.skb points to the ciphertext skb for access to metadata like length). Only data records are allowed zero-copy, and we break the processing loop after each non-data record. So we should never zero-copy and then find out that the record type has changed. The corn... | CVSS3: 7 | 0% Низкий | 5 месяцев назад | |
CVE-2025-39682 In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call must process either - only contiguous DATA records (any number of them) - one non-DATA record If the next record has different type than what has already been processed we break out of the main processing loop. If the record has already been decrypted (which may be the case for TLS 1.3 where we don't know type until decryption) we queue the pending record to the rx_list. Next recvmsg() will pick it up from there. Queuing the skb to rx_list after zero-copy decrypt is not possible, since in that case we decrypted directly to the user space buffer, and we don't have an skb to queue (darg.skb points to the ciphertext skb for access to metadata like length). Only data records are allowed zero-copy, and we break the processing loop after each non-data record. So we should never zero-copy and then find out that the record type has changed. The | CVSS3: 7.1 | 0% Низкий | 5 месяцев назад | |
CVE-2025-39682 tls: fix handling of zero-length records on the rx_list | CVSS3: 6.5 | 0% Низкий | 5 месяцев назад | |
CVE-2025-39682 In the Linux kernel, the following vulnerability has been resolved: t ... | CVSS3: 7.1 | 0% Низкий | 5 месяцев назад | |
GHSA-v2pf-75pf-9c5h In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call must process either - only contiguous DATA records (any number of them) - one non-DATA record If the next record has different type than what has already been processed we break out of the main processing loop. If the record has already been decrypted (which may be the case for TLS 1.3 where we don't know type until decryption) we queue the pending record to the rx_list. Next recvmsg() will pick it up from there. Queuing the skb to rx_list after zero-copy decrypt is not possible, since in that case we decrypted directly to the user space buffer, and we don't have an skb to queue (darg.skb points to the ciphertext skb for access to metadata like length). Only data records are allowed zero-copy, and we break the processing loop after each non-data record. So we should never zero-copy and then find out that the record type has changed. T... | CVSS3: 7.1 | 0% Низкий | 5 месяцев назад | |
BDU:2025-12988 Уязвимость функции recvmsg() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7 | 0% Низкий | 6 месяцев назад | |
SUSE-SU-2026:0209-1 Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 14 дней назад | |||
SUSE-SU-2026:0203-1 Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6) | 14 дней назад | |||
SUSE-SU-2026:0145-1 Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 15 SP7) | 19 дней назад | |||
SUSE-SU-2026:0202-1 Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 14 дней назад | |||
SUSE-SU-2026:0146-1 Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7) | 19 дней назад | |||
ROS-20251202-02 Множественные уязвимости kernel-lt | CVSS2: 6.6 | 2 месяца назад | ||
RLSA-2025:16880 Moderate: kernel security update | 4 месяца назад | |||
ELSA-2025-16880 ELSA-2025-16880: kernel security update (MODERATE) | 4 месяца назад | |||
RLSA-2025:16904 Moderate: kernel security update | 4 месяца назад | |||
ELSA-2025-20608 ELSA-2025-20608: Unbreakable Enterprise kernel security update (IMPORTANT) | 5 месяцев назад | |||
ELSA-2025-16904 ELSA-2025-16904: kernel security update (MODERATE) | 4 месяца назад | |||
SUSE-SU-2026:0284-1 Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) | 12 дней назад | |||
SUSE-SU-2026:0283-1 Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) | 12 дней назад |
Уязвимостей на страницу