CVE-2025-39682Linux vulnerability

23 documents8 sources
Severity
7.1HIGHNVD
EPSS
0.0%
top 99.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 5
Latest updateMar 1

Description

In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call must process either - only contiguous DATA records (any number of them) - one non-DATA record If the next record has different type than what has already been processed we break out of the main processing loop. If the record has already been decrypted (which may be the case for TLS 1.3 where we don't know type until decryption) we queue the pending re

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages3 packages

NVDlinux/linux_kernel6.06.1.149+4
Debianlinux/linux_kernel< 6.1.153-1+2
CVEListV5linux/linux84c61fe1a75b4255df1e1e7c054c9e6d048da4172902c3ebcca52ca845c03182000e8d71d3a5196f+5

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

4
OSV
CVE-2025-39682: In tls_sw_recvmsg of tls_sw2026-03-01
OSV
CVE-2025-39682: In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call must p2025-09-05
CVEList
tls: fix handling of zero-length records on the rx_list2025-09-05
GHSA
GHSA-v2pf-75pf-9c5h: In the Linux kernel, the following vulnerability has been resolved: tls: fix handling of zero-length records on the rx_list Each recvmsg() call must2025-09-05

📋Vendor Advisories

18
Ubuntu
Linux kernel (Azure, N-Series) vulnerabilities2026-01-09
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2025-12-17
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-11-25
Ubuntu
Linux kernel (Raspberry Pi Real-time) vulnerabilities2025-11-24
Ubuntu
Linux kernel (AWS) vulnerabilities2025-11-12
CVE-2025-39682 — Linux vulnerability | cvebase