CVE-2024-58240

In the Linux kernel, the following vulnerability has been resolved: tls: separate no-async decryption request handling from async If we're not doing async, the handling is much simpler. There's no reference counting, we just need to wait for the completion to wake us up and return its result. We should preferably also use a separate crypto_wait. I'm not seeing a UAF as I did in the past, I think aec7961916f3 ("tls: fix race between async notify and socket close") took care of it. This will make the next fix easier.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

09 Jan 2026, 19:17

Type Values Removed Values Added
CWE CWE-416
References () https://git.kernel.org/stable/c/41532b785e9d79636b3815a64ddf6a096647d011 - () https://git.kernel.org/stable/c/41532b785e9d79636b3815a64ddf6a096647d011 - Patch
References () https://git.kernel.org/stable/c/48905146d11dbf1ddbb2967319016a83976953f5 - () https://git.kernel.org/stable/c/48905146d11dbf1ddbb2967319016a83976953f5 - Patch
References () https://git.kernel.org/stable/c/999115298017a675d8ddf61414fc7a85c89f1186 - () https://git.kernel.org/stable/c/999115298017a675d8ddf61414fc7a85c89f1186 - Patch
References () https://git.kernel.org/stable/c/dec5b6e7b211e405d3bcb504562ab21aa7e5a64d - () https://git.kernel.org/stable/c/dec5b6e7b211e405d3bcb504562ab21aa7e5a64d - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 18:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/48905146d11dbf1ddbb2967319016a83976953f5 -

28 Aug 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-28 10:15

Updated : 2026-01-09 19:17


NVD link : CVE-2024-58240

Mitre link : CVE-2024-58240

CVE.ORG link : CVE-2024-58240


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free