CVE-2026-31533 PUBLISHED

net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption

Assigner: Linux
Reserved: 09.03.2026 Published: 23.04.2026 Updated: 23.04.2026

In the Linux kernel, the following vulnerability has been resolved:

net/tls: fix use-after-free in -EBUSY error path of tls_do_encryption

The -EBUSY handling in tls_do_encryption(), introduced by commit 859054147318 ("net: tls: handle backlogging of crypto requests"), has a use-after-free due to double cleanup of encrypt_pending and the scatterlist entry.

When crypto_aead_encrypt() returns -EBUSY, the request is enqueued to the cryptd backlog and the async callback tls_encrypt_done() will be invoked upon completion. That callback unconditionally restores the scatterlist entry (sge->offset, sge->length) and decrements ctx->encrypt_pending. However, if tls_encrypt_async_wait() returns an error, the synchronous error path in tls_do_encryption() performs the same cleanup again, double-decrementing encrypt_pending and double-restoring the scatterlist.

The double-decrement corrupts the encrypt_pending sentinel (initialized to 1), making tls_encrypt_async_wait() permanently skip the wait for pending async callbacks. A subsequent sendmsg can then free the tls_rec via bpf_exec_tx_verdict() while a cryptd callback is still pending, resulting in a use-after-free when the callback fires on the freed record.

Fix this by skipping the synchronous cleanup when the -EBUSY async wait returns an error, since the callback has already handled encrypt_pending and sge restoration.

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 3ade391adc584f17b5570fd205de3ad029090368 to 414fc5e5a5aff776c150f1b86770e0a25a35df3a (excl.)
  • affected from cd1bbca03f3c1d845ce274c0d0a66de8e5929f72 to 02f3ecadb23558bbe068e6504118f1b712d4ece0 (excl.)
  • affected from 13eca403876bbea3716e82cdfe6f1e6febb38754 to 0e43e0a3c94044acc74b8e0927c27972eb5a59e8 (excl.)
  • affected from 8590541473188741055d27b955db0777569438e3 to aa9facde6c5005205874c37db3fd25799d741baf (excl.)
  • affected from 8590541473188741055d27b955db0777569438e3 to 5d70eb25b41e9b010828cd12818b06a0c3b04412 (excl.)
  • affected from 8590541473188741055d27b955db0777569438e3 to 2694d408b0e595024e0fc1d64ff9db0358580f74 (excl.)
  • affected from 8590541473188741055d27b955db0777569438e3 to a9b8b18364fffce4c451e6f6fd218fa4ab646705 (excl.)
  • Version ab6397f072e5097f267abf5cb08a8004e6b17694 is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.8 is affected
  • unaffected from 0 to 6.8 (excl.)
  • unaffected from 5.15.203 to 5.15.* (incl.)
  • unaffected from 6.1.169 to 6.1.* (incl.)
  • unaffected from 6.6.135 to 6.6.* (incl.)
  • unaffected from 6.12.82 to 6.12.* (incl.)
  • unaffected from 6.18.23 to 6.18.* (incl.)
  • unaffected from 6.19.13 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References