Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-38471
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-28 Jul, 2025 | 11:21
Updated At-03 Nov, 2025 | 17:38
Rejected At-
▼CVE Numbering Authority (CNA)
tls: always refresh the queue when reading sock

In the Linux kernel, the following vulnerability has been resolved: tls: always refresh the queue when reading sock After recent changes in net-next TCP compacts skbs much more aggressively. This unearthed a bug in TLS where we may try to operate on an old skb when checking if all skbs in the queue have matching decrypt state and geometry. BUG: KASAN: slab-use-after-free in tls_strp_check_rcv+0x898/0x9a0 [tls] (net/tls/tls_strp.c:436 net/tls/tls_strp.c:530 net/tls/tls_strp.c:544) Read of size 4 at addr ffff888013085750 by task tls/13529 CPU: 2 UID: 0 PID: 13529 Comm: tls Not tainted 6.16.0-rc5-virtme Call Trace: kasan_report+0xca/0x100 tls_strp_check_rcv+0x898/0x9a0 [tls] tls_rx_rec_wait+0x2c9/0x8d0 [tls] tls_sw_recvmsg+0x40f/0x1aa0 [tls] inet_recvmsg+0x1c3/0x1f0 Always reload the queue, fast path is to have the record in the queue when we wake, anyway (IOW the path going down "if !strp->stm.full_len").

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/tls/tls_strp.c
Default Status
unaffected
Versions
Affected
  • From 0d87bbd39d7fd1135ab9eca672d760470f6508e8 before 730fed2ff5e259495712518e18d9f521f61972bb (git)
  • From 0d87bbd39d7fd1135ab9eca672d760470f6508e8 before 1f3a429c21e0e43e8b8c55d30701e91411a4df02 (git)
  • From 0d87bbd39d7fd1135ab9eca672d760470f6508e8 before cdb767915fc9a15d88d19d52a1455f1dc3e5ddc8 (git)
  • From 0d87bbd39d7fd1135ab9eca672d760470f6508e8 before c76f6f437c46b2390888e0e1dc7aafafa9f4e0c6 (git)
  • From 0d87bbd39d7fd1135ab9eca672d760470f6508e8 before 4ab26bce3969f8fd925fe6f6f551e4d1a508c68b (git)
  • 2277d7cbdf47531b2c3cd01ba15255fa955aab35 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • net/tls/tls_strp.c
Default Status
affected
Versions
Affected
  • 6.1
Unaffected
  • From 0 before 6.1 (semver)
  • From 6.1.147 through 6.1.* (semver)
  • From 6.6.100 through 6.6.* (semver)
  • From 6.12.40 through 6.12.* (semver)
  • From 6.15.8 through 6.15.* (semver)
  • From 6.16 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/730fed2ff5e259495712518e18d9f521f61972bb
N/A
https://git.kernel.org/stable/c/1f3a429c21e0e43e8b8c55d30701e91411a4df02
N/A
https://git.kernel.org/stable/c/cdb767915fc9a15d88d19d52a1455f1dc3e5ddc8
N/A
https://git.kernel.org/stable/c/c76f6f437c46b2390888e0e1dc7aafafa9f4e0c6
N/A
https://git.kernel.org/stable/c/4ab26bce3969f8fd925fe6f6f551e4d1a508c68b
N/A
Hyperlink: https://git.kernel.org/stable/c/730fed2ff5e259495712518e18d9f521f61972bb
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1f3a429c21e0e43e8b8c55d30701e91411a4df02
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cdb767915fc9a15d88d19d52a1455f1dc3e5ddc8
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c76f6f437c46b2390888e0e1dc7aafafa9f4e0c6
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/4ab26bce3969f8fd925fe6f6f551e4d1a508c68b
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
Resource: N/A
Details not found