CVE-2026-23414

medium

Description

In the Linux kernel, the following vulnerability has been resolved: tls: Purge async_hold in tls_decrypt_async_wait() The async_hold queue pins encrypted input skbs while the AEAD engine references their scatterlist data. Once tls_decrypt_async_wait() returns, every AEAD operation has completed and the engine no longer references those skbs, so they can be freed unconditionally. A subsequent patch adds batch async decryption to tls_sw_read_sock(), introducing a new call site that must drain pending AEAD operations and release held skbs. Move __skb_queue_purge(&ctx->async_hold) into tls_decrypt_async_wait() so the purge is centralized and every caller -- recvmsg's drain path, the -EBUSY fallback in tls_do_decryption(), and the new read_sock batch path -- releases held skbs on synchronization without each site managing the purge independently. This fixes a leak when tls_strp_msg_hold() fails part-way through, after having added some cloned skbs to the async_hold queue. tls_decrypt_sg() will then call tls_decrypt_async_wait() to process all pending decrypts, and drop back to synchronous mode, but tls_sw_recvmsg() only flushes the async_hold queue when one record has been processed in "fully-async" mode, which may not be the case here. [[email protected]: added leak comment]

References

https://git.kernel.org/stable/c/fd8037e1f18ca5336934d0e0e7e1a4fe097e749d

https://git.kernel.org/stable/c/9f557c7eae127b44d2e863917dc986a4b6cb1269

https://git.kernel.org/stable/c/84a8335d8300576f1b377ae24abca1d9f197807f

https://git.kernel.org/stable/c/6dc11e0bd0a5466bcc76d275c09e5537bd0597dd

https://git.kernel.org/stable/c/2dcf324855c34e7f934ce978aa19b645a8f3ee71

Details

Source: Mitre, NVD

Published: 2026-04-02

Updated: 2026-04-02

Risk Information

CVSS v2

Base Score: 2.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

Severity: Low

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Severity: Medium