In the Linux kernel, the following vulnerability has been resolved:
net: tls: fix use-after-free with partial reads and async decrypt
tls_decrypt_sg doesn't take a reference on the pages from clear_skb,
so the put_page() in tls_decrypt_done releases them, and we trigger
a use-after-free in process_rx_list when we try to read from the
partially-read skb.
Metrics
Affected Vendors & Products
References
History
Tue, 05 Nov 2024 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T08:51:32.734Z
Reserved: 2024-02-19T14:20:24.125Z
Link: CVE-2024-26582

Updated: 2024-08-02T00:07:19.870Z

Status : Modified
Published: 2024-02-21T15:15:09.327
Modified: 2024-11-21T09:02:35.210
Link: CVE-2024-26582
