CVE-2025-39682
BaseFortify
Publication date: 2025-09-05
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's TLS implementation involves improper handling of zero-length TLS records on the receive list (rx_list). Specifically, the kernel expects each recvmsg() call to process either only contiguous data records or a single non-data record. However, a corner case was missed when the initial record comes from the rx_list and is zero-length. This can cause issues because zero-copy decryption is only allowed for data records, and the processing loop breaks after each non-data record. The vulnerability arises from the kernel not correctly handling zero-length records in this scenario, potentially leading to incorrect processing of TLS records.
How can this vulnerability impact me? :
The vulnerability could lead to incorrect processing of TLS records in the Linux kernel, which might affect the integrity or reliability of TLS communications. Since TLS is used to secure network communications, improper handling of records could potentially cause data corruption, unexpected behavior, or denial of service in applications relying on TLS. However, specific impacts such as data leakage or privilege escalation are not detailed in the provided information.