CVE-2026-23414
Memory Leak in Linux Kernel TLS Async Decryption Component
Publication date: 2026-04-02
Last updated on: 2026-04-27
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.18 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.19 (inc) to 6.19.11 (exc) |
| linux | linux_kernel | From 6.1.158 (inc) to 6.1.168 (exc) |
| linux | linux_kernel | From 6.12.55 (inc) to 6.12.80 (exc) |
| linux | linux_kernel | From 6.17.5 (inc) to 6.18 (exc) |
| linux | linux_kernel | From 6.18.1 (inc) to 6.18.21 (exc) |
| linux | linux_kernel | From 6.6.114 (inc) to 6.6.131 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a memory leak in the Linux kernel's TLS (Transport Layer Security) implementation. Specifically, the async_hold queue, which holds encrypted input socket buffers (skbs) during asynchronous AEAD (Authenticated Encryption with Associated Data) operations, was not always properly purged. When tls_strp_msg_hold() fails part-way after adding cloned skbs to the async_hold queue, these skbs were not released correctly because tls_sw_recvmsg() only flushed the queue under certain conditions. This could lead to a resource leak where memory buffers remain allocated longer than necessary.
The fix centralizes the purging of the async_hold queue inside the tls_decrypt_async_wait() function, ensuring that all callers release held skbs properly after AEAD operations complete, preventing the leak.
How can this vulnerability impact me? :
This vulnerability can cause a memory leak in the Linux kernel's TLS processing. Over time, this leak could lead to increased memory usage, potentially degrading system performance or causing resource exhaustion. In environments with heavy TLS traffic, this might result in slower response times or even system instability if memory resources become critically low.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by a patch in the Linux kernel that purges the async_hold queue in tls_decrypt_async_wait(), ensuring that held skbs are released properly and preventing memory leaks.
To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes this fix.