CVE-2025-38616
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
22/08/2025
Last modified:
26/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tls: handle data disappearing from under the TLS ULP<br />
<br />
TLS expects that it owns the receive queue of the TCP socket.<br />
This cannot be guaranteed in case the reader of the TCP socket<br />
entered before the TLS ULP was installed, or uses some non-standard<br />
read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy<br />
early exit (which leaves anchor pointing to a freed skb) with real<br />
error handling. Wipe the parsing state and tell the reader to retry.<br />
<br />
We already reload the anchor every time we (re)acquire the socket lock,<br />
so the only condition we need to avoid is an out of bounds read<br />
(not having enough bytes in the socket for previously parsed record len).<br />
<br />
If some data was read from under TLS but there&#39;s enough in the queue<br />
we&#39;ll reload and decrypt what is most likely not a valid TLS record.<br />
Leading to some undefined behavior from TLS perspective (corrupting<br />
a stream? missing an alert? missing an attack?) but no kernel crash<br />
should take place.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.6.103 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.43 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2fb97ed9e2672b4f6e24ce206ac1a875ce4bcb38
- https://git.kernel.org/stable/c/6db015fc4b5d5f63a64a193f65d98da3a7fc811d
- https://git.kernel.org/stable/c/db3658a12d5ec4db7185ae7476151a50521b7207
- https://git.kernel.org/stable/c/eb0336f213fe88bbdb7d2b19c9c9ec19245a3155
- https://git.kernel.org/stable/c/f1fe99919f629f980d0b8a7ff16950bffe06a859



