Количество 14
Количество 14
CVE-2025-40071
In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Don't block input queue by waiting MSC Currently gsm_queue() processes incoming frames and when opening a DLC channel it calls gsm_dlci_open() which calls gsm_modem_update(). If basic mode is used it calls gsm_modem_upd_via_msc() and it cannot block the input queue by waiting the response to come into the same input queue. Instead allow sending Modem Status Command without waiting for remote end to respond. Define a new function gsm_modem_send_initial_msc() for this purpose. As MSC is only valid for basic encoding, it does not do anything for advanced or when convergence layer type 2 is used.
CVE-2025-40071
In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Don't block input queue by waiting MSC Currently gsm_queue() processes incoming frames and when opening a DLC channel it calls gsm_dlci_open() which calls gsm_modem_update(). If basic mode is used it calls gsm_modem_upd_via_msc() and it cannot block the input queue by waiting the response to come into the same input queue. Instead allow sending Modem Status Command without waiting for remote end to respond. Define a new function gsm_modem_send_initial_msc() for this purpose. As MSC is only valid for basic encoding, it does not do anything for advanced or when convergence layer type 2 is used.
CVE-2025-40071
tty: n_gsm: Don't block input queue by waiting MSC
CVE-2025-40071
In the Linux kernel, the following vulnerability has been resolved: t ...
GHSA-xj3g-qjx7-6cfm
In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Don't block input queue by waiting MSC Currently gsm_queue() processes incoming frames and when opening a DLC channel it calls gsm_dlci_open() which calls gsm_modem_update(). If basic mode is used it calls gsm_modem_upd_via_msc() and it cannot block the input queue by waiting the response to come into the same input queue. Instead allow sending Modem Status Command without waiting for remote end to respond. Define a new function gsm_modem_send_initial_msc() for this purpose. As MSC is only valid for basic encoding, it does not do anything for advanced or when convergence layer type 2 is used.
BDU:2025-16403
Уязвимость компонента n_gsm ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2025-28040
ELSA-2025-28040: Unbreakable Enterprise kernel security update (IMPORTANT)
openSUSE-SU-2025:20091-1
Security update for the Linux Kernel
SUSE-SU-2025:4128-1
Security update for the Linux Kernel
SUSE-SU-2025:4301-1
Security update for the Linux Kernel
SUSE-SU-2025:4140-1
Security update for the Linux Kernel
SUSE-SU-2025:4141-1
Security update for the Linux Kernel
SUSE-SU-2025:4132-1
Security update for the Linux Kernel
SUSE-SU-2025:4057-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-40071 In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Don't block input queue by waiting MSC Currently gsm_queue() processes incoming frames and when opening a DLC channel it calls gsm_dlci_open() which calls gsm_modem_update(). If basic mode is used it calls gsm_modem_upd_via_msc() and it cannot block the input queue by waiting the response to come into the same input queue. Instead allow sending Modem Status Command without waiting for remote end to respond. Define a new function gsm_modem_send_initial_msc() for this purpose. As MSC is only valid for basic encoding, it does not do anything for advanced or when convergence layer type 2 is used. | 0% Низкий | 3 месяца назад | ||
CVE-2025-40071 In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Don't block input queue by waiting MSC Currently gsm_queue() processes incoming frames and when opening a DLC channel it calls gsm_dlci_open() which calls gsm_modem_update(). If basic mode is used it calls gsm_modem_upd_via_msc() and it cannot block the input queue by waiting the response to come into the same input queue. Instead allow sending Modem Status Command without waiting for remote end to respond. Define a new function gsm_modem_send_initial_msc() for this purpose. As MSC is only valid for basic encoding, it does not do anything for advanced or when convergence layer type 2 is used. | 0% Низкий | 3 месяца назад | ||
CVE-2025-40071 tty: n_gsm: Don't block input queue by waiting MSC | CVSS3: 5.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-40071 In the Linux kernel, the following vulnerability has been resolved: t ... | 0% Низкий | 3 месяца назад | ||
GHSA-xj3g-qjx7-6cfm In the Linux kernel, the following vulnerability has been resolved: tty: n_gsm: Don't block input queue by waiting MSC Currently gsm_queue() processes incoming frames and when opening a DLC channel it calls gsm_dlci_open() which calls gsm_modem_update(). If basic mode is used it calls gsm_modem_upd_via_msc() and it cannot block the input queue by waiting the response to come into the same input queue. Instead allow sending Modem Status Command without waiting for remote end to respond. Define a new function gsm_modem_send_initial_msc() for this purpose. As MSC is only valid for basic encoding, it does not do anything for advanced or when convergence layer type 2 is used. | 0% Низкий | 3 месяца назад | ||
BDU:2025-16403 Уязвимость компонента n_gsm ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7 | 0% Низкий | 5 месяцев назад | |
ELSA-2025-28040 ELSA-2025-28040: Unbreakable Enterprise kernel security update (IMPORTANT) | около 2 месяцев назад | |||
openSUSE-SU-2025:20091-1 Security update for the Linux Kernel | 2 месяца назад | |||
SUSE-SU-2025:4128-1 Security update for the Linux Kernel | 3 месяца назад | |||
SUSE-SU-2025:4301-1 Security update for the Linux Kernel | 2 месяца назад | |||
SUSE-SU-2025:4140-1 Security update for the Linux Kernel | 3 месяца назад | |||
SUSE-SU-2025:4141-1 Security update for the Linux Kernel | 3 месяца назад | |||
SUSE-SU-2025:4132-1 Security update for the Linux Kernel | 3 месяца назад | |||
SUSE-SU-2025:4057-1 Security update for the Linux Kernel | 3 месяца назад |
Уязвимостей на страницу