CVE-2024-26582

In the Linux kernel, the following vulnerability has been resolved: net: tls: fix use-after-free with partial reads and async decrypt tls_decrypt_sg doesn't take a reference on the pages from clear_skb, so the put_page() in tls_decrypt_done releases them, and we trigger a use-after-free in process_rx_list when we try to read from the partially-read skb.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96 - Patch () https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96 - Patch
References () https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f - Patch () https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f - Patch
References () https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df - Patch () https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df - Patch
References () https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5 - Patch () https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5 - Patch

15 Mar 2024, 13:56

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
References () https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96 - () https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96 - Patch
References () https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f - () https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f - Patch
References () https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df - () https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df - Patch
References () https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5 - () https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5 - Patch

11 Mar 2024, 18:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

28 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/ -

23 Feb 2024, 09:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df -
  • () https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5 -
  • () https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96 -

21 Feb 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-21 15:15

Updated : 2024-11-21 09:02


NVD link : CVE-2024-26582

Mitre link : CVE-2024-26582

CVE.ORG link : CVE-2024-26582


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free