Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-26582
HistoryFeb 21, 2024 - 12:00 a.m.

CVE-2024-26582

2024-02-2100:00:00
ubuntu.com
ubuntu.com
16
linux kernel
vulnerability
cve-2024-26582
resolved
net
tls
use-after-free
partial reads
async decrypt
process_rx_list
unix

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved: net:
tls: fix use-after-free with partial reads and async decrypt tls_decrypt_sg
doesn’t take a reference on the pages from clear_skb, so the put_page() in
tls_decrypt_done releases them, and we trigger a use-after-free in
process_rx_list when we try to read from the partially-read skb.

Notes

Author Note
Priority reason: Reported by Google kCTF
rodrigo-zaiden USN-6765-1 for linux-oem-6.5 wrongly stated that this CVE was fixed in version 6.5.0-1022.23. The mentioned notice was revoked and the state of the fix for linux-oem-6.5 was recovered to the previous state.
Rows per page:
1-10 of 201

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

High

EPSS

0

Percentile

5.1%