{"vulnerability": "CVE-2025-37756", "sightings": [{"uuid": "c2b8983a-0558-4704-a131-0d632d0e99ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37756", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lo4hlsb53j22", "content": "", "creation_timestamp": "2025-05-01T13:55:47.689631Z"}, {"uuid": "8e12e720-1618-48eb-b8db-e9f0b4060196", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37756", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lxxdrqsjg72k", "content": "", "creation_timestamp": "2025-09-03T19:16:02.019115Z"}, {"uuid": "e8ac776d-3389-4a33-9c37-a288e3491829", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-37756", "type": "seen", "source": "https://t.me/cvedetector/24214", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-37756 - Linux Kernel TLS Disconnect Disallowed\", \n  \"Content\": \"CVE ID : CVE-2025-37756 \nPublished : May 1, 2025, 1:15 p.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnet: tls: explicitly disallow disconnect  \n  \nsyzbot discovered that it can disconnect a TLS socket and then  \nrun into all sort of unexpected corner cases. I have a vague  \nrecollection of Eric pointing this out to us a long time ago.  \nSupporting disconnect is really hard, for one thing if offload  \nis enabled we'd need to wait for all packets to be _acked_.  \nDisconnect is not commonly used, disallow it.  \n  \nThe immediate problem syzbot run into is the warning in the strp,  \nbut that's just the easiest bug to trigger:  \n  \n  WARNING: CPU: 0 PID: 5834 at net/tls/tls_strp.c:486 tls_strp_msg_load+0x72e/0xa80 net/tls/tls_strp.c:486  \n  RIP: 0010:tls_strp_msg_load+0x72e/0xa80 net/tls/tls_strp.c:486  \n  Call Trace:  \n     \n   tls_rx_rec_wait+0x280/0xa60 net/tls/tls_sw.c:1363  \n   tls_sw_recvmsg+0x85c/0x1c30 net/tls/tls_sw.c:2043  \n   inet6_recvmsg+0x2c9/0x730 net/ipv6/af_inet6.c:678  \n   sock_recvmsg_nosec net/socket.c:1023 [inline]  \n   sock_recvmsg+0x109/0x280 net/socket.c:1045  \n   __sys_recvfrom+0x202/0x380 net/socket.c:2237 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-01T16:30:06.000000Z"}, {"uuid": "7260ca1f-5b03-4fa0-9b30-2c81afd83011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-37756", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}]}