In the Linux kernel, the following vulnerability has been resolved: tls: wait for pending async decryptions if tls_strp_msg_hold fails Async decryption calls tls_strp_msg_hold to create a clone of the input skb to hold references to the memory it uses. If we fail to allocate that clone, proceeding with async decryption can lead to various issues (UAF on the skb, writing into userspace memory after the recv() call has returned). In this case, wait for all pending decryption requests.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025111255-CVE-2025-40176-f2e3@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:23241 https://access.redhat.com/errata/RHSA-2025:23241
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:0453 https://access.redhat.com/errata/RHSA-2026:0453
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:0457 https://access.redhat.com/errata/RHSA-2026:0457
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:0489 https://access.redhat.com/errata/RHSA-2026:0489
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2026:0534 https://access.redhat.com/errata/RHSA-2026:0534
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions Via RHSA-2026:0535 https://access.redhat.com/errata/RHSA-2026:0535