CVE-2024-26582

Updated: 2024-04-18 05:04:17.358751

Description:

In the Linux kernel, the following vulnerability has been resolved: net: tls: fix use-after-free with partial reads and async decrypt tls_decrypt_sg doesn't take a reference on the pages from clear_skb, so the put_page() in tls_decrypt_done releases them, and we trigger a use-after-free in process_rx_list when we try to read from the partially-read skb.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.8

Status

OS name Project name Version Score Severity Status Errata Last updated
AlmaLinux 9.2 ESU kernel 5.14.0 7.8 HIGH In Testing 2024-04-18 11:11:01
AlmaLinux 9.2 FIPS kernel 5.14.0 7.8 HIGH In Testing 2024-04-18 11:11:01
CentOS 6 ELS kernel 2.6.32 7.8 HIGH Needs Triage 2024-04-18 05:04:19
CentOS 7 ELS kernel 3.10.0 7.8 HIGH Needs Triage 2024-04-18 05:04:25
CentOS 8.4 ELS kernel 4.18.0 7.8 HIGH Needs Triage 2024-04-18 05:04:24
CentOS 8.5 ELS kernel 4.18.0 7.8 HIGH Not Vulnerable 2024-04-29 05:39:30
CloudLinux 6 ELS kernel 2.6.32 7.8 HIGH Needs Triage 2024-04-18 05:04:20
Oracle Linux 6 ELS kernel 2.6.32 7.8 HIGH Needs Triage 2024-04-18 05:04:26