Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1248 articles · 101974 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23414PATCHED
linux · linux kernel

tls: Purge async_hold in tls_decrypt_async_wait()

Description

In the Linux kernel, the following vulnerability has been resolved: tls: Purge async_hold in tls_decrypt_async_wait() The async_hold queue pins encrypted input skbs while the AEAD engine references their scatterlist data. Once tls_decrypt_async_wait() returns, every AEAD operation has completed and the engine no longer references those skbs, so they can be freed unconditionally. A subsequent patch adds batch async decryption to tls_sw_read_sock(), introducing a new call site that must drain pending AEAD operations and release held skbs. Move __skb_queue_purge(&ctx->async_hold) into tls_decrypt_async_wait() so the purge is centralized and every caller -- recvmsg's drain path, the -EBUSY fallback in tls_do_decryption(), and the new read_sock batch path -- releases held skbs on synchronization without each site managing the purge independently. This fixes a leak when tls_strp_msg_hold() fails part-way through, after having added some cloned skbs to the async_hold queue. tls_decrypt_sg() will then call tls_decrypt_async_wait() to process all pending decrypts, and drop back to synchronous mode, but tls_sw_recvmsg() only flushes the async_hold queue when one record has been processed in "fully-async" mode, which may not be the case here. [pabeni@redhat.com: added leak comment]

Affected Products

VendorProductVersions
linuxlinux kernelc61d4368197d65c4809d9271f3b85325a600586a, 39dec4ea3daf77f684308576baf483b55ca7f160, b8a6ff84abbcbbc445463de58704686011edc8e1, b8a6ff84abbcbbc445463de58704686011edc8e1, b8a6ff84abbcbbc445463de58704686011edc8e1, 9f83fd0c179e0f458e824e417f9d5ad53443f685, 4fc109d0ab196bd943b7451276690fb6bb48c2e0, 6.18, 6.6.130, 6.12.79, 6.18.20, 6.19.10, 7.0-rc5

References

  • https://git.kernel.org/stable/c/2dcf324855c34e7f934ce978aa19b645a8f3ee71
  • https://git.kernel.org/stable/c/6dc11e0bd0a5466bcc76d275c09e5537bd0597dd
  • https://git.kernel.org/stable/c/9f557c7eae127b44d2e863917dc986a4b6cb1269
  • https://git.kernel.org/stable/c/fd8037e1f18ca5336934d0e0e7e1a4fe097e749d
  • https://git.kernel.org/stable/c/84a8335d8300576f1b377ae24abca1d9f197807f

Related News (1 articles)

Tier C
VulDB6h ago
CVE-2026-23414 | Linux Kernel up to 6.6.130/6.12.79/6.18.20/6.19.10/7.0-rc5 tls_decrypt_async_wait information disclosure
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
Patch available
2dcf324855c34e7f934ce978aa19b645a8f3ee716dc11e0bd0a5466bcc76d275c09e5537bd0597dd9f557c7eae127b44d2e863917dc986a4b6cb1269fd8037e1f18ca5336934d0e0e7e1a4fe097e749d84a8335d8300576f1b377ae24abca1d9f197807f06.6.1316.12.806.18.216.19.117.0-rc6
PublishedApr 2, 2026
Last enriched6h agov2
Trending Score30
Source articles1
Independent1
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-23413EXP
clsact: Fix use-after-free in init/destroy rollback asymmetry
Trending: 49
CRITICALCVE-2026-23416EXP
mm/mseal: update VMA end correctly on merge
Trending: 49
CRITICALCVE-2026-23417EXP
bpf: Fix constant blinding for PROBE_MEM32 stores
Trending: 49
CRITICALCVE-2026-23412
netfilter: bpf: defer hook memory release until rcu readers are done
Trending: 41
MEDIUMCVE-2026-22977
In the Linux kernel, the following vulnerability has been resolved: net: sock: fix hardened usercopy panic in sock_recv_errqueue skbuff_fclone_cache was created without defining a usercopy region, [
Trending: 31

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 2, 2026
Discovered by ZDM
Apr 2, 2026
Patch Available
Apr 2, 2026
Updated: severity, affectedVersions
Apr 2, 2026

Version History

v2
Last enriched 6h ago
v2Tier C6h ago

Updated severity to CRITICAL, added new affected versions, and noted no exploit available.

severityaffectedVersions
via VulDB
v16h ago

Initial creation