CVE-2024-26582
Public on 2024-02-21
Modified on 2024-02-29
Description
In the Linux kernel, the following vulnerability has been resolved:
net: tls: fix use-after-free with partial reads and async decrypt
tls_decrypt_sg doesn't take a reference on the pages from clear_skb,
so the put_page() in tls_decrypt_done releases them, and we trigger
a use-after-free in process_rx_list when we try to read from the
partially-read skb.
net: tls: fix use-after-free with partial reads and async decrypt
tls_decrypt_sg doesn't take a reference on the pages from clear_skb,
so the put_page() in tls_decrypt_done releases them, and we trigger
a use-after-free in process_rx_list when we try to read from the
partially-read skb.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | kernel | Not Affected | ||
Amazon Linux 2 - Core | kernel | Not Affected | ||
Amazon Linux 2 - Kernel-5.10 Extra | kernel | Not Affected | ||
Amazon Linux 2 - Kernel-5.15 Extra | kernel | Not Affected | ||
Amazon Linux 2 - Kernel-5.4 Extra | kernel | Not Affected | ||
Amazon Linux 2023 | kernel | 2024-02-29 | ALAS2023-2024-549 | Fixed |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.5 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
NVD | CVSSv3 | 7.8 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |