๐Ÿ” CVE Alert

CVE-2026-31533

UNKNOWN 0.0

net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption The -EBUSY handling in tls_do_encryption(), introduced by commit 859054147318 ("net: tls: handle backlogging of crypto requests"), has a use-after-free due to double cleanup of encrypt_pending and the scatterlist entry. When crypto_aead_encrypt() returns -EBUSY, the request is enqueued to the cryptd backlog and the async callback tls_encrypt_done() will be invoked upon completion. That callback unconditionally restores the scatterlist entry (sge->offset, sge->length) and decrements ctx->encrypt_pending. However, if tls_encrypt_async_wait() returns an error, the synchronous error path in tls_do_encryption() performs the same cleanup again, double-decrementing encrypt_pending and double-restoring the scatterlist. The double-decrement corrupts the encrypt_pending sentinel (initialized to 1), making tls_encrypt_async_wait() permanently skip the wait for pending async callbacks. A subsequent sendmsg can then free the tls_rec via bpf_exec_tx_verdict() while a cryptd callback is still pending, resulting in a use-after-free when the callback fires on the freed record. Fix this by skipping the synchronous cleanup when the -EBUSY async wait returns an error, since the callback has already handled encrypt_pending and sge restoration.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 23, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
3ade391adc584f17b5570fd205de3ad029090368 < 414fc5e5a5aff776c150f1b86770e0a25a35df3a cd1bbca03f3c1d845ce274c0d0a66de8e5929f72 < 02f3ecadb23558bbe068e6504118f1b712d4ece0 13eca403876bbea3716e82cdfe6f1e6febb38754 < 0e43e0a3c94044acc74b8e0927c27972eb5a59e8 8590541473188741055d27b955db0777569438e3 < aa9facde6c5005205874c37db3fd25799d741baf 8590541473188741055d27b955db0777569438e3 < 5d70eb25b41e9b010828cd12818b06a0c3b04412 8590541473188741055d27b955db0777569438e3 < 2694d408b0e595024e0fc1d64ff9db0358580f74 8590541473188741055d27b955db0777569438e3 < a9b8b18364fffce4c451e6f6fd218fa4ab646705 ab6397f072e5097f267abf5cb08a8004e6b17694
Linux / Linux
6.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/414fc5e5a5aff776c150f1b86770e0a25a35df3a git.kernel.org: https://git.kernel.org/stable/c/02f3ecadb23558bbe068e6504118f1b712d4ece0 git.kernel.org: https://git.kernel.org/stable/c/0e43e0a3c94044acc74b8e0927c27972eb5a59e8 git.kernel.org: https://git.kernel.org/stable/c/aa9facde6c5005205874c37db3fd25799d741baf git.kernel.org: https://git.kernel.org/stable/c/5d70eb25b41e9b010828cd12818b06a0c3b04412 git.kernel.org: https://git.kernel.org/stable/c/2694d408b0e595024e0fc1d64ff9db0358580f74 git.kernel.org: https://git.kernel.org/stable/c/a9b8b18364fffce4c451e6f6fd218fa4ab646705