In the Linux kernel, the following vulnerability has been resolved:
sunrpc: fix client side handling of tls alerts
A security exploit was discovered in NFS over TLS in tls_alert_recv
due to its assumption that there is valid data in the msghdr's
iterator's kvec.
Instead, this patch proposes the rework how control messages are
setup and used by sock_recvmsg().
If no control message structure is setup, kTLS layer will read and
process TLS data record types. As soon as it encounters a TLS control
message, it would return an error. At that point, NFS can setup a kvec
backed control buffer and read in the control message such as a TLS
alert. Scott found that a msg iterator can advance the kvec pointer
as a part of the copy process thus we need to revert the iterator
before calling into the tls_alert_recv.
References
Configurations
Configuration 1 (hide)
|
History
26 Nov 2025, 20:03
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/3ee397eaaca4fa04db21bb98c8f1d0c6cc525368 - Patch | |
| References | () https://git.kernel.org/stable/c/3feada5baf4dc96e151ff2ca54630e1d274e5458 - Patch | |
| References | () https://git.kernel.org/stable/c/a55b3d15331859d9fdd261cfa6d34ca2aeb0fb95 - Patch | |
| References | () https://git.kernel.org/stable/c/c36b2fbd60e8f9c6f975522130998608880c93be - Patch | |
| References | () https://git.kernel.org/stable/c/cc5d59081fa26506d02de2127ab822f40d88bc5a - Patch |
20 Aug 2025, 14:40
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
19 Aug 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-19 17:15
Updated : 2025-11-26 20:03
NVD link : CVE-2025-38571
Mitre link : CVE-2025-38571
CVE.ORG link : CVE-2025-38571
JSON object : View
Products Affected
linux
- linux_kernel
CWE
