Use-After-Free Vulnerability in Linux Kernel: TLS Encryption Component
CVE-2026-31533
What is CVE-2026-31533?
A use-after-free vulnerability exists in the TLS encryption component of the Linux kernel, specifically within the tls_do_encryption() function. This issue arises due to improper handling of the -EBUSY error path, resulting in a double cleanup of encryption state. When an encryption request encounters an -EBUSY condition, it is queued, but if an error occurs subsequently in the synchronous error path, the state is incorrectly adjusted again. This ambiguity can lead to a situation where memory can be freed while still pending processing by a callback, potentially allowing for exploitation. A fix has been implemented to prevent this double decrement of the state, enhancing overall stability and security during TLS operations.
Affected Version(s)
Linux 3ade391adc584f17b5570fd205de3ad029090368 < 414fc5e5a5aff776c150f1b86770e0a25a35df3a
Linux cd1bbca03f3c1d845ce274c0d0a66de8e5929f72 < 02f3ecadb23558bbe068e6504118f1b712d4ece0
Linux 13eca403876bbea3716e82cdfe6f1e6febb38754 < 0e43e0a3c94044acc74b8e0927c27972eb5a59e8