Home

Description

In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix client side handling of tls alerts A security exploit was discovered in NFS over TLS in tls_alert_recv due to its assumption that there is valid data in the msghdr's iterator's kvec. Instead, this patch proposes the rework how control messages are setup and used by sock_recvmsg(). If no control message structure is setup, kTLS layer will read and process TLS data record types. As soon as it encounters a TLS control message, it would return an error. At that point, NFS can setup a kvec backed control buffer and read in the control message such as a TLS alert. Scott found that a msg iterator can advance the kvec pointer as a part of the copy process thus we need to revert the iterator before calling into the tls_alert_recv.

PUBLISHED Reserved 2025-04-16 | Published 2025-08-19 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

dea034b963c8901bdcc3d3880c04f0d75c95112f before a55b3d15331859d9fdd261cfa6d34ca2aeb0fb95
affected

dea034b963c8901bdcc3d3880c04f0d75c95112f before c36b2fbd60e8f9c6f975522130998608880c93be
affected

dea034b963c8901bdcc3d3880c04f0d75c95112f before 3ee397eaaca4fa04db21bb98c8f1d0c6cc525368
affected

dea034b963c8901bdcc3d3880c04f0d75c95112f before 3feada5baf4dc96e151ff2ca54630e1d274e5458
affected

dea034b963c8901bdcc3d3880c04f0d75c95112f before cc5d59081fa26506d02de2127ab822f40d88bc5a
affected

Default status
affected

6.5
affected

Any version before 6.5
unaffected

6.6.102
unaffected

6.12.42
unaffected

6.15.10
unaffected

6.16.1
unaffected

6.17
unaffected

References

git.kernel.org/...c/a55b3d15331859d9fdd261cfa6d34ca2aeb0fb95

git.kernel.org/...c/c36b2fbd60e8f9c6f975522130998608880c93be

git.kernel.org/...c/3ee397eaaca4fa04db21bb98c8f1d0c6cc525368

git.kernel.org/...c/3feada5baf4dc96e151ff2ca54630e1d274e5458

git.kernel.org/...c/cc5d59081fa26506d02de2127ab822f40d88bc5a

cve.org (CVE-2025-38571)

nvd.nist.gov (CVE-2025-38571)

Download JSON