CVE-2024-26582

high

Description

In the Linux kernel, the following vulnerability has been resolved: net: tls: fix use-after-free with partial reads and async decrypt tls_decrypt_sg doesn't take a reference on the pages from clear_skb, so the put_page() in tls_decrypt_done releases them, and we trigger a use-after-free in process_rx_list when we try to read from the partially-read skb.

References

https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5

https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df

https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f

https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96

Details

Source: Mitre, NVD

Published: 2024-02-21

Updated: 2024-03-15

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High