In the Linux kernel, the following vulnerability has been resolved:
net: tls: fix use-after-free with partial reads and async decrypt
tls_decrypt_sg doesn't take a reference on the pages from clear_skb,
so the put_page() in tls_decrypt_done releases them, and we trigger
a use-after-free in process_rx_list when we try to read from the
partially-read skb.
References
Configurations
Configuration 1 (hide)
|
History
04 Nov 2025, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 09:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96 - Patch | |
| References | () https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f - Patch | |
| References | () https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df - Patch | |
| References | () https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5 - Patch |
15 Mar 2024, 13:56
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-416 | |
| First Time |
Linux
Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f - Patch | |
| References | () https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df - Patch | |
| References | () https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5 - Patch | |
| References | () https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96 - Patch |
11 Mar 2024, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
28 Feb 2024, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
23 Feb 2024, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Feb 2024, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-21 15:15
Updated : 2025-11-04 19:17
NVD link : CVE-2024-26582
Mitre link : CVE-2024-26582
CVE.ORG link : CVE-2024-26582
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
