Use-After-Free Vulnerability in Linux Kernel: TLS Encryption Component
CVE-2026-31533

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
23 April 2026

What is CVE-2026-31533?

A use-after-free vulnerability exists in the TLS encryption component of the Linux kernel, specifically within the tls_do_encryption() function. This issue arises due to improper handling of the -EBUSY error path, resulting in a double cleanup of encryption state. When an encryption request encounters an -EBUSY condition, it is queued, but if an error occurs subsequently in the synchronous error path, the state is incorrectly adjusted again. This ambiguity can lead to a situation where memory can be freed while still pending processing by a callback, potentially allowing for exploitation. A fix has been implemented to prevent this double decrement of the state, enhancing overall stability and security during TLS operations.

Affected Version(s)

Linux 3ade391adc584f17b5570fd205de3ad029090368 < 414fc5e5a5aff776c150f1b86770e0a25a35df3a

Linux cd1bbca03f3c1d845ce274c0d0a66de8e5929f72 < 02f3ecadb23558bbe068e6504118f1b712d4ece0

Linux 13eca403876bbea3716e82cdfe6f1e6febb38754 < 0e43e0a3c94044acc74b8e0927c27972eb5a59e8

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.