CVE-2025-39946
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
04/10/2025
Última modificación:
27/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tls: make sure to abort the stream if headers are bogus<br />
<br />
Normally we wait for the socket to buffer up the whole record<br />
before we service it. If the socket has a tiny buffer, however,<br />
we read out the data sooner, to prevent connection stalls.<br />
Make sure that we abort the connection when we find out late<br />
that the record is actually invalid. Retrying the parsing is<br />
fine in itself but since we copy some more data each time<br />
before we parse we can overflow the allocated skb space.<br />
<br />
Constructing a scenario in which we&#39;re under pressure without<br />
enough data in the socket to parse the length upfront is quite<br />
hard. syzbot figured out a way to do this by serving us the header<br />
in small OOB sends, and then filling in the recvbuf with a large<br />
normal send.<br />
<br />
Make sure that tls_rx_msg_size() aborts strp, if we reach<br />
an invalid record there&#39;s really no way to recover.
Impacto
Puntuación base 3.x
5.50
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (incluyendo) | 6.1.154 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (incluyendo) | 6.6.108 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (incluyendo) | 6.12.49 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (incluyendo) | 6.16.9 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc6:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/0aeb54ac4cd5cf8f60131b4d9ec0b6dc9c27b20d
- https://git.kernel.org/stable/c/208640e6225cc929a05adbf79d1df558add3e231
- https://git.kernel.org/stable/c/4cefe5be73886f383639fe0850bb72d5b568a7b9
- https://git.kernel.org/stable/c/61ca2da5fb8f433ce8bbd1657c84a86272133e6b
- https://git.kernel.org/stable/c/b36462146d86b1f22e594fe4dae611dffacfb203



