-

CVE-2025-38571

In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix client side handling of tls alerts

A security exploit was discovered in NFS over TLS in tls_alert_recv
due to its assumption that there is valid data in the msghdr's
iterator's kvec.

Instead, this patch proposes the rework how control messages are
setup and used by sock_recvmsg().

If no control message structure is setup, kTLS layer will read and
process TLS data record types. As soon as it encounters a TLS control
message, it would return an error. At that point, NFS can setup a kvec
backed control buffer and read in the control message such as a TLS
alert. Scott found that a msg iterator can advance the kvec pointer
as a part of the copy process thus we need to revert the iterator
before calling into the tls_alert_recv.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < a55b3d15331859d9fdd261cfa6d34ca2aeb0fb95
Version dea034b963c8901bdcc3d3880c04f0d75c95112f
Status affected
Version < c36b2fbd60e8f9c6f975522130998608880c93be
Version dea034b963c8901bdcc3d3880c04f0d75c95112f
Status affected
Version < 3ee397eaaca4fa04db21bb98c8f1d0c6cc525368
Version dea034b963c8901bdcc3d3880c04f0d75c95112f
Status affected
Version < 3feada5baf4dc96e151ff2ca54630e1d274e5458
Version dea034b963c8901bdcc3d3880c04f0d75c95112f
Status affected
Version < cc5d59081fa26506d02de2127ab822f40d88bc5a
Version dea034b963c8901bdcc3d3880c04f0d75c95112f
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.5
Status affected
Version < 6.5
Version 0
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.057
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string