NAK/cmt: Re: [SRU][N/P][PATCH v2 0/1] CVE-2025-39946
Tim Whisonant
tim.whisonant at canonical.com
Thu Oct 16 00:45:16 UTC 2025
On Wed, Oct 15, 2025 at 06:12:47PM +0200, Paolo Pisati wrote:
> On Tue, Oct 14, 2025 at 04:18:32PM -0700, Tim Whisonant wrote:
> > SRU Justification:
> >
> > [Impact]
> >
> > tls: make sure to abort the stream if headers are bogus
> >
> > Normally we wait for the socket to buffer up the whole record
> > before we service it. If the socket has a tiny buffer, however,
> > we read out the data sooner, to prevent connection stalls.
> > Make sure that we abort the connection when we find out late
> > that the record is actually invalid. Retrying the parsing is
> > fine in itself but since we copy some more data each time
> > before we parse we can overflow the allocated skb space.
> >
> > Constructing a scenario in which we're under pressure without
> > enough data in the socket to parse the length upfront is quite
> > hard. syzbot figured out a way to do this by serving us the header
> > in small OOB sends, and then filling in the recvbuf with a large
> > normal send.
> >
> > Make sure that tls_rx_msg_size() aborts strp, if we reach
> > an invalid record there's really no way to recover.
> >
> > [Fix]
> >
> > Plucky: cherry picked from upstream
> > Noble: cherry picked from upstream
> > Jammy: not affected
> > Focal: not affected
> > Bionic: not affected
> > Xenial: not affected
> > Trusty: not affected
> >
> > [Test Plan]
> >
> > Compile and boot tested.
> >
> > [Where problems could occur]
> >
> > The changes affect the net TLS stream parser. Issues might
> > arise as failures to decode encrypted streams while in
> > the state created by the syzbot check mentioned above.
> >
> > [Notes]
> >
> > v2 - Review of v1 discovered that the patch no longer applied
> > to the Plucky branch. v2 was created by rebasing the branch
> > and cherry-picking the fix commit to Plucky.
> >
> > Jakub Kicinski (1):
> > tls: make sure to abort the stream if headers are bogus
> >
> > net/tls/tls.h | 1 +
> > net/tls/tls_strp.c | 14 +++++++++-----
> > net/tls/tls_sw.c | 3 +--
> > 3 files changed, 11 insertions(+), 7 deletions(-)
>
> Thanks for your patches Tim, but they are all missing the BugLink, can you send
> a V2?
>
> Thanks.
> --
> bye,
> p.
Hi Paolo, do we need a BugLink for CVE's now? Sorry, I wasn't aware of
that. Which bug would we use?
Tim
More information about the kernel-team
mailing list