
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-38616 is a vulnerability in the Linux kernel's TLS (Transport Layer Security) implementation. The issue was discovered and disclosed on August 22, 2025, affecting the TLS ULP (Upper Layer Protocol) handling of TCP socket receive queue data (NVD).
The vulnerability stems from TLS ULP's assumption of exclusive ownership over the TCP socket's receive queue. This assumption fails when a reader of the TCP socket is initiated before TLS ULP installation or when non-standard read APIs (such as zerocopy) are employed. The issue involves a WARN_ON() condition and a buggy early exit that leaves an anchor pointing to a freed skb (socket buffer), requiring proper error handling implementation (NVD).
When exploited, this vulnerability can lead to undefined behavior from a TLS perspective, potentially resulting in stream corruption, missed alerts, or undetected attacks. While the implementation prevents kernel crashes, it may compromise the integrity and security of TLS communications (NVD).
The fix involves replacing the problematic WARN_ON() and early exit with proper error handling mechanisms. The solution includes wiping the parsing state and implementing a retry mechanism for the reader. The anchor is reloaded every time the socket lock is (re)acquired to maintain data integrity (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."