CVE-2025-40071
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's tty n_gsm driver involves the handling of the input queue when processing Modem Status Commands (MSC). Previously, the gsm_queue() function would block the input queue while waiting for a response to an MSC, which could cause issues. The fix changes this behavior to send the MSC without waiting for a remote response, preventing the input queue from being blocked. This is specifically relevant for basic encoding mode and does not affect advanced encoding or convergence layer type 2.
How can this vulnerability impact me? :
The vulnerability could cause the input queue in the tty n_gsm driver to be blocked while waiting for a Modem Status Command response, potentially leading to delays or disruptions in processing incoming frames. This could affect the stability or responsiveness of systems using this driver in the Linux kernel, especially in scenarios relying on basic encoding mode.