In the Linux kernel, the following vulnerability has been resolved:
net: tls: fix use-after-free with partial reads and async decrypt
tls_decrypt_sg doesn't take a reference on the pages from clear_skb,
so the put_page() in tls_decrypt_done releases them, and we trigger
a use-after-free in process_rx_list when we try to read from the
partially-read skb.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 05 Nov 2024 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Linux
Published: 2024-02-21T14:59:11.229Z
Updated: 2025-11-04T18:29:45.171Z
Reserved: 2024-02-19T14:20:24.125Z
Link: CVE-2024-26582
Updated: 2025-11-04T18:29:45.171Z
Status : Modified
Published: 2024-02-21T15:15:09.327
Modified: 2025-11-04T19:17:01.480
Link: CVE-2024-26582