We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38471

tls: always refresh the queue when reading sock



Description

In the Linux kernel, the following vulnerability has been resolved: tls: always refresh the queue when reading sock After recent changes in net-next TCP compacts skbs much more aggressively. This unearthed a bug in TLS where we may try to operate on an old skb when checking if all skbs in the queue have matching decrypt state and geometry. BUG: KASAN: slab-use-after-free in tls_strp_check_rcv+0x898/0x9a0 [tls] (net/tls/tls_strp.c:436 net/tls/tls_strp.c:530 net/tls/tls_strp.c:544) Read of size 4 at addr ffff888013085750 by task tls/13529 CPU: 2 UID: 0 PID: 13529 Comm: tls Not tainted 6.16.0-rc5-virtme Call Trace: kasan_report+0xca/0x100 tls_strp_check_rcv+0x898/0x9a0 [tls] tls_rx_rec_wait+0x2c9/0x8d0 [tls] tls_sw_recvmsg+0x40f/0x1aa0 [tls] inet_recvmsg+0x1c3/0x1f0 Always reload the queue, fast path is to have the record in the queue when we wake, anyway (IOW the path going down "if !strp->stm.full_len").

Reserved 2025-04-16 | Published 2025-07-28 | Updated 2025-07-28 | Assigner Linux

Product status

Default status
unaffected

0d87bbd39d7fd1135ab9eca672d760470f6508e8 before 730fed2ff5e259495712518e18d9f521f61972bb
affected

0d87bbd39d7fd1135ab9eca672d760470f6508e8 before 1f3a429c21e0e43e8b8c55d30701e91411a4df02
affected

0d87bbd39d7fd1135ab9eca672d760470f6508e8 before cdb767915fc9a15d88d19d52a1455f1dc3e5ddc8
affected

0d87bbd39d7fd1135ab9eca672d760470f6508e8 before c76f6f437c46b2390888e0e1dc7aafafa9f4e0c6
affected

0d87bbd39d7fd1135ab9eca672d760470f6508e8 before 4ab26bce3969f8fd925fe6f6f551e4d1a508c68b
affected

2277d7cbdf47531b2c3cd01ba15255fa955aab35
affected

Default status
affected

6.1
affected

Any version before 6.1
unaffected

6.1.147
unaffected

6.6.100
unaffected

6.12.40
unaffected

6.15.8
unaffected

6.16
unaffected

References

git.kernel.org/...c/730fed2ff5e259495712518e18d9f521f61972bb

git.kernel.org/...c/1f3a429c21e0e43e8b8c55d30701e91411a4df02

git.kernel.org/...c/cdb767915fc9a15d88d19d52a1455f1dc3e5ddc8

git.kernel.org/...c/c76f6f437c46b2390888e0e1dc7aafafa9f4e0c6

git.kernel.org/...c/4ab26bce3969f8fd925fe6f6f551e4d1a508c68b

cve.org (CVE-2025-38471)

nvd.nist.gov (CVE-2025-38471)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38471

Support options

Helpdesk Chat, Email, Knowledgebase