Vulnerability Details CVE-2026-23414
In the Linux kernel, the following vulnerability has been resolved:
tls: Purge async_hold in tls_decrypt_async_wait()
The async_hold queue pins encrypted input skbs while
the AEAD engine references their scatterlist data. Once
tls_decrypt_async_wait() returns, every AEAD operation
has completed and the engine no longer references those
skbs, so they can be freed unconditionally.
A subsequent patch adds batch async decryption to
tls_sw_read_sock(), introducing a new call site that
must drain pending AEAD operations and release held
skbs. Move __skb_queue_purge(&ctx->async_hold) into
tls_decrypt_async_wait() so the purge is centralized
and every caller -- recvmsg's drain path, the -EBUSY
fallback in tls_do_decryption(), and the new read_sock
batch path -- releases held skbs on synchronization
without each site managing the purge independently.
This fixes a leak when tls_strp_msg_hold() fails part-way through,
after having added some cloned skbs to the async_hold
queue. tls_decrypt_sg() will then call tls_decrypt_async_wait() to
process all pending decrypts, and drop back to synchronous mode, but
tls_sw_recvmsg() only flushes the async_hold queue when one record has
been processed in "fully-async" mode, which may not be the case here.
[pabeni@redhat.com: added leak comment]
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 17.4%
CVSS Severity
CVSS v3 Score 5.5
Products affected by CVE-2026-23414
-
cpe:2.3:o:linux:linux_kernel:6.1.158
-
cpe:2.3:o:linux:linux_kernel:6.1.159
-
cpe:2.3:o:linux:linux_kernel:6.1.160
-
cpe:2.3:o:linux:linux_kernel:6.1.161
-
cpe:2.3:o:linux:linux_kernel:6.1.162
-
cpe:2.3:o:linux:linux_kernel:6.1.163
-
cpe:2.3:o:linux:linux_kernel:6.1.164
-
cpe:2.3:o:linux:linux_kernel:6.1.165
-
cpe:2.3:o:linux:linux_kernel:6.12.55
-
cpe:2.3:o:linux:linux_kernel:6.12.56
-
cpe:2.3:o:linux:linux_kernel:6.12.57
-
cpe:2.3:o:linux:linux_kernel:6.12.58
-
cpe:2.3:o:linux:linux_kernel:6.12.59
-
cpe:2.3:o:linux:linux_kernel:6.12.60
-
cpe:2.3:o:linux:linux_kernel:6.12.61
-
cpe:2.3:o:linux:linux_kernel:6.12.62
-
cpe:2.3:o:linux:linux_kernel:6.12.63
-
cpe:2.3:o:linux:linux_kernel:6.12.64
-
cpe:2.3:o:linux:linux_kernel:6.12.65
-
cpe:2.3:o:linux:linux_kernel:6.12.66
-
cpe:2.3:o:linux:linux_kernel:6.12.67
-
cpe:2.3:o:linux:linux_kernel:6.12.68
-
cpe:2.3:o:linux:linux_kernel:6.12.69
-
cpe:2.3:o:linux:linux_kernel:6.12.70
-
cpe:2.3:o:linux:linux_kernel:6.12.72
-
cpe:2.3:o:linux:linux_kernel:6.12.74
-
cpe:2.3:o:linux:linux_kernel:6.12.75
-
cpe:2.3:o:linux:linux_kernel:6.12.77
-
cpe:2.3:o:linux:linux_kernel:6.17.10
-
cpe:2.3:o:linux:linux_kernel:6.17.11
-
cpe:2.3:o:linux:linux_kernel:6.17.12
-
cpe:2.3:o:linux:linux_kernel:6.17.13
-
cpe:2.3:o:linux:linux_kernel:6.17.5
-
cpe:2.3:o:linux:linux_kernel:6.17.6
-
cpe:2.3:o:linux:linux_kernel:6.17.7
-
cpe:2.3:o:linux:linux_kernel:6.17.8
-
cpe:2.3:o:linux:linux_kernel:6.17.9
-
cpe:2.3:o:linux:linux_kernel:6.18
-
cpe:2.3:o:linux:linux_kernel:6.18.1
-
cpe:2.3:o:linux:linux_kernel:6.18.10
-
cpe:2.3:o:linux:linux_kernel:6.18.11
-
cpe:2.3:o:linux:linux_kernel:6.18.13
-
cpe:2.3:o:linux:linux_kernel:6.18.14
-
cpe:2.3:o:linux:linux_kernel:6.18.2
-
cpe:2.3:o:linux:linux_kernel:6.18.3
-
cpe:2.3:o:linux:linux_kernel:6.18.4
-
cpe:2.3:o:linux:linux_kernel:6.18.5
-
cpe:2.3:o:linux:linux_kernel:6.18.6
-
cpe:2.3:o:linux:linux_kernel:6.18.7
-
cpe:2.3:o:linux:linux_kernel:6.18.8
-
cpe:2.3:o:linux:linux_kernel:6.18.9
-
cpe:2.3:o:linux:linux_kernel:6.19
-
cpe:2.3:o:linux:linux_kernel:6.19.1
-
cpe:2.3:o:linux:linux_kernel:6.19.3
-
cpe:2.3:o:linux:linux_kernel:6.19.4
-
cpe:2.3:o:linux:linux_kernel:6.6.114
-
cpe:2.3:o:linux:linux_kernel:6.6.115
-
cpe:2.3:o:linux:linux_kernel:6.6.116
-
cpe:2.3:o:linux:linux_kernel:6.6.117
-
cpe:2.3:o:linux:linux_kernel:6.6.118
-
cpe:2.3:o:linux:linux_kernel:6.6.119
-
cpe:2.3:o:linux:linux_kernel:6.6.120
-
cpe:2.3:o:linux:linux_kernel:6.6.121
-
cpe:2.3:o:linux:linux_kernel:6.6.122
-
cpe:2.3:o:linux:linux_kernel:6.6.123
-
cpe:2.3:o:linux:linux_kernel:6.6.124
-
cpe:2.3:o:linux:linux_kernel:6.6.125
-
cpe:2.3:o:linux:linux_kernel:6.6.127
-
cpe:2.3:o:linux:linux_kernel:6.6.128
-
cpe:2.3:o:linux:linux_kernel:7.0