In the Linux kernel, the following vulnerability has been resolved:
net: tls, fix WARNIING in __sk_msg_free
A splice with MSG_SPLICE_PAGES will cause tls code to use the
tls_sw_sendmsg_splice path in the TLS sendmsg code to move the user
provided pages from the msg into the msg_pl. This will loop over the
msg until msg_pl is full, checked by sk_msg_full(msg_pl). The user
can also set the MORE flag to hint stack to delay sending until receiving
more pages and ideally a full buffer.
If the user adds more pages to the msg than can fit in the msg_pl
scatterlist (MAX_MSG_FRAGS) we should ignore the MORE flag and send
the buffer anyways.
What actually happens though is we abort the msg to msg_pl scatterlist
setup and then because we forget to set 'full record' indicating we
can no longer consume data without a send we fallthrough to the 'continue'
path which will check if msg_data_left(msg) has more bytes to send and
then attempts to fit them in the already full msg_pl. Then next
iteration of sender doing send will encounter a full msg_pl and throw
the warning in the syzbot report.
To fix simply check if we have a full_record in splice code path and
if not send the msg regardless of MORE flag.
References
Configurations
Configuration 1 (hide)
|
History
26 Sep 2025, 16:05
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/02e368eb1444a4af649b73cbe2edd51780511d86 - Patch | |
| References | () https://git.kernel.org/stable/c/294e7ea85f34748f04e5f3f9dba6f6b911d31aa8 - Patch | |
| References | () https://git.kernel.org/stable/c/dc9dfc8dc629e42f2234e3327b75324ffc752bc9 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux linux Kernel
Linux |
|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
21 Nov 2024, 09:21
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://git.kernel.org/stable/c/02e368eb1444a4af649b73cbe2edd51780511d86 - | |
| References | () https://git.kernel.org/stable/c/294e7ea85f34748f04e5f3f9dba6f6b911d31aa8 - | |
| References | () https://git.kernel.org/stable/c/dc9dfc8dc629e42f2234e3327b75324ffc752bc9 - |
17 May 2024, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-17 15:15
Updated : 2025-09-26 16:05
NVD link : CVE-2024-35841
Mitre link : CVE-2024-35841
CVE.ORG link : CVE-2024-35841
JSON object : View
Products Affected
linux
- linux_kernel
CWE
