In the Linux kernel, the following vulnerability has been resolved: tls: get psock ref after taking rxlock to avoid leak At the start of tls_sw_recvmsg, we take a reference on the psock, and then call tls_rx_reader_lock. If that fails, we return directly without releasing the reference. Instead of adding a new label, just take the reference after locking has succeeded, since we don’t need it before.
git.kernel.org/linus/417e91e856099e9b8a42a2520e2255e6afe024be
git.kernel.org/stable/c/30fabe50a7ace3e9d57cf7f9288f33ea408491c8
git.kernel.org/stable/c/417e91e856099e9b8a42a2520e2255e6afe024be
git.kernel.org/stable/c/b565d294e3d5aa809566a4d819835da11997d8b3
git.kernel.org/stable/c/f1b7f14130d782433bc98c1e1e41ce6b4d4c3096
ubuntu.com/security/CVE-2024-35908
ubuntu.com/security/notices/USN-6893-1
ubuntu.com/security/notices/USN-6893-2
ubuntu.com/security/notices/USN-6893-3
ubuntu.com/security/notices/USN-6918-1
www.cve.org/CVERecord?id=CVE-2024-35908