net: tls: explicitly disallow disconnect

Summary

CVECVE-2025-37756
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2025-05-01 13:15:54 UTC
Updated2026-05-07 08:15:59 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: net: tls: explicitly disallow disconnect syzbot discovered that it can disconnect a TLS socket and then run into all sort of unexpected corner cases. I have a vague recollection of Eric pointing this out to us a long time ago. Supporting disconnect is really hard, for one thing if offload is enabled we'd need to wait for all packets to be _acked_. Disconnect is not commonly used, disallow it. The immediate problem syzbot run into is the warning in the strp, but that's just the easiest bug to trigger: WARNING: CPU: 0 PID: 5834 at net/tls/tls_strp.c:486 tls_strp_msg_load+0x72e/0xa80 net/tls/tls_strp.c:486 RIP: 0010:tls_strp_msg_load+0x72e/0xa80 net/tls/tls_strp.c:486 Call Trace: <TASK> tls_rx_rec_wait+0x280/0xa60 net/tls/tls_sw.c:1363 tls_sw_recvmsg+0x85c/0x1c30 net/tls/tls_sw.c:2043 inet6_recvmsg+0x2c9/0x730 net/ipv6/af_inet6.c:678 sock_recvmsg_nosec net/socket.c:1023 [inline] sock_recvmsg+0x109/0x280 net/socket.c:1045 __sys_recvfrom+0x202/0x380 net/socket.c:2237

Risk And Classification

Primary CVSS: v3.1 5.5 MEDIUM from [email protected]

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Problem Types: NVD-CWE-noinfo

CVSS v3.1 Breakdown

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Linux Linux Kernel All All All All

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected 3c4d7559159bfe1e3b94df3a657b2cda3a34e218 7bdcf5bc35ae59fc4a0fa23276e84b4d1534a3cf git Not specified
CNA Linux Linux affected 3c4d7559159bfe1e3b94df3a657b2cda3a34e218 ac91c6125468be720eafde9c973994cb45b61d44 git Not specified
CNA Linux Linux affected 3c4d7559159bfe1e3b94df3a657b2cda3a34e218 f3ce4d3f874ab7919edca364c147ac735f9f1d04 git Not specified
CNA Linux Linux affected 3c4d7559159bfe1e3b94df3a657b2cda3a34e218 2bcad8fefcecdd5f005d8c550b25d703c063c34a git Not specified
CNA Linux Linux affected 3c4d7559159bfe1e3b94df3a657b2cda3a34e218 9fcbca0f801580cbb583e9cb274e2c7fbe766ca6 git Not specified
CNA Linux Linux affected 3c4d7559159bfe1e3b94df3a657b2cda3a34e218 c665bef891e8972e1d3ce5bbc0d42a373346a2c3 git Not specified
CNA Linux Linux affected 3c4d7559159bfe1e3b94df3a657b2cda3a34e218 8513411ec321942bd3cfed53d5bb700665c67d86 git Not specified
CNA Linux Linux affected 3c4d7559159bfe1e3b94df3a657b2cda3a34e218 5071a1e606b30c0c11278d3c6620cd6a24724cf6 git Not specified
CNA Linux Linux affected 4.13 Not specified
CNA Linux Linux unaffected 4.13 semver Not specified
CNA Linux Linux unaffected 5.10.237 5.10.* semver Not specified
CNA Linux Linux unaffected 5.15.181 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.135 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.88 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.24 6.12.* semver Not specified
CNA Linux Linux unaffected 6.13.12 6.13.* semver Not specified
CNA Linux Linux unaffected 6.14.3 6.14.* semver Not specified
CNA Linux Linux unaffected 6.15 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
lists.debian.org/debian-lts-announce/2025/05/msg00030.html af854a3a-2127-422b-91ae-364da2661108 lists.debian.org Mailing List
git.kernel.org/stable/c/9fcbca0f801580cbb583e9cb274e2c7fbe766ca6 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/c665bef891e8972e1d3ce5bbc0d42a373346a2c3 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/2bcad8fefcecdd5f005d8c550b25d703c063c34a 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/5071a1e606b30c0c11278d3c6620cd6a24724cf6 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
www.openwall.com/lists/oss-security/2026/05/07/1 af854a3a-2127-422b-91ae-364da2661108 www.openwall.com
git.kernel.org/stable/c/f3ce4d3f874ab7919edca364c147ac735f9f1d04 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/7bdcf5bc35ae59fc4a0fa23276e84b4d1534a3cf 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
lists.debian.org/debian-lts-announce/2025/05/msg00045.html af854a3a-2127-422b-91ae-364da2661108 lists.debian.org Mailing List
git.kernel.org/stable/c/8513411ec321942bd3cfed53d5bb700665c67d86 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
git.kernel.org/stable/c/ac91c6125468be720eafde9c973994cb45b61d44 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org Patch
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report