CVE-2025-39946
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/10/2025
Last modified:
27/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tls: make sure to abort the stream if headers are bogus<br />
<br />
Normally we wait for the socket to buffer up the whole record<br />
before we service it. If the socket has a tiny buffer, however,<br />
we read out the data sooner, to prevent connection stalls.<br />
Make sure that we abort the connection when we find out late<br />
that the record is actually invalid. Retrying the parsing is<br />
fine in itself but since we copy some more data each time<br />
before we parse we can overflow the allocated skb space.<br />
<br />
Constructing a scenario in which we&#39;re under pressure without<br />
enough data in the socket to parse the length upfront is quite<br />
hard. syzbot figured out a way to do this by serving us the header<br />
in small OOB sends, and then filling in the recvbuf with a large<br />
normal send.<br />
<br />
Make sure that tls_rx_msg_size() aborts strp, if we reach<br />
an invalid record there&#39;s really no way to recover.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (including) | 6.1.154 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.108 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.49 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.16.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0aeb54ac4cd5cf8f60131b4d9ec0b6dc9c27b20d
- https://git.kernel.org/stable/c/208640e6225cc929a05adbf79d1df558add3e231
- https://git.kernel.org/stable/c/4cefe5be73886f383639fe0850bb72d5b568a7b9
- https://git.kernel.org/stable/c/61ca2da5fb8f433ce8bbd1657c84a86272133e6b
- https://git.kernel.org/stable/c/b36462146d86b1f22e594fe4dae611dffacfb203



