In the Linux kernel, the following vulnerability has been...
Unreviewed
Published
Jul 28, 2025
to the GitHub Advisory Database
•
Updated Jul 28, 2025
Description
Published by the National Vulnerability Database
Jul 28, 2025
Published to the GitHub Advisory Database
Jul 28, 2025
Last updated
Jul 28, 2025
In the Linux kernel, the following vulnerability has been resolved:
tls: always refresh the queue when reading sock
After recent changes in net-next TCP compacts skbs much more
aggressively. This unearthed a bug in TLS where we may try
to operate on an old skb when checking if all skbs in the
queue have matching decrypt state and geometry.
Always reload the queue, fast path is to have the record in the queue
when we wake, anyway (IOW the path going down "if !strp->stm.full_len").
References