CVE-2024-26583

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
21/02/2024
Last modified:
25/05/2024

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tls: fix race between async notify and socket close<br /> <br /> The submitting thread (one which called recvmsg/sendmsg)<br /> may exit as soon as the async crypto handler calls complete()<br /> so any code past that point risks touching already freed data.<br /> <br /> Try to avoid the locking and extra flags altogether.<br /> Have the main thread hold an extra reference, this way<br /> we can depend solely on the atomic ref counter for<br /> synchronization.<br /> <br /> Don&amp;#39;t futz with reiniting the completion, either, we are now<br /> tightly controlling when completion fires.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.7.0 (including) 6.1.79 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2.0 (including) 6.6.18 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7.0 (including) 6.7.6 (excluding)