CVE-2025-38616

Severity CVSS v4.0:
Pending analysis
Type:
CWE-125 Out-of-bounds Read
Publication date:
22/08/2025
Last modified:
26/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tls: handle data disappearing from under the TLS ULP<br /> <br /> TLS expects that it owns the receive queue of the TCP socket.<br /> This cannot be guaranteed in case the reader of the TCP socket<br /> entered before the TLS ULP was installed, or uses some non-standard<br /> read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy<br /> early exit (which leaves anchor pointing to a freed skb) with real<br /> error handling. Wipe the parsing state and tell the reader to retry.<br /> <br /> We already reload the anchor every time we (re)acquire the socket lock,<br /> so the only condition we need to avoid is an out of bounds read<br /> (not having enough bytes in the socket for previously parsed record len).<br /> <br /> If some data was read from under TLS but there&amp;#39;s enough in the queue<br /> we&amp;#39;ll reload and decrypt what is most likely not a valid TLS record.<br /> Leading to some undefined behavior from TLS perspective (corrupting<br /> a stream? missing an alert? missing an attack?) but no kernel crash<br /> should take place.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.0 (including) 6.6.103 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.43 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.16 (including) 6.16.2 (excluding)
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*