CVE-2025-38616
BaseFortify
Publication date: 2025-08-22
Last updated on: 2025-11-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.17 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's TLS implementation involves the handling of data disappearing from under the TLS Upper Layer Protocol (ULP). TLS expects to fully control the receive queue of the TCP socket, but this assumption fails if the TCP socket reader started before TLS ULP was installed or uses non-standard read APIs like zerocopy. The issue was that a WARN_ON() and an early exit left a pointer referencing freed memory, causing potential out-of-bounds reads or undefined behavior such as corrupting the TLS stream or missing alerts. The fix replaces the buggy handling with proper error handling that wipes the parsing state and instructs the reader to retry, preventing kernel crashes.
How can this vulnerability impact me? :
This vulnerability can lead to undefined behavior in the TLS stream, such as stream corruption, missing alerts, or missing detection of attacks. While it should not cause a kernel crash, it may compromise the integrity and reliability of TLS communications on affected Linux systems, potentially impacting secure data transmission.