CVE-2024-26583
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
21/02/2024
Last modified:
25/05/2024
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
tls: fix race between async notify and socket close<br />
<br />
The submitting thread (one which called recvmsg/sendmsg)<br />
may exit as soon as the async crypto handler calls complete()<br />
so any code past that point risks touching already freed data.<br />
<br />
Try to avoid the locking and extra flags altogether.<br />
Have the main thread hold an extra reference, this way<br />
we can depend solely on the atomic ref counter for<br />
synchronization.<br />
<br />
Don&#39;t futz with reiniting the completion, either, we are now<br />
tightly controlling when completion fires.
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7.0 (including) | 6.1.79 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2.0 (including) | 6.6.18 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7.0 (including) | 6.7.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/6209319b2efdd8524691187ee99c40637558fa33
- https://git.kernel.org/stable/c/7a3ca06d04d589deec81f56229a9a9d62352ce01
- https://git.kernel.org/stable/c/86dc27ee36f558fe223dbdfbfcb6856247356f4a
- https://git.kernel.org/stable/c/aec7961916f3f9e88766e2688992da6980f11b8d
- https://git.kernel.org/stable/c/f17d21ea73918ace8afb9c2d8e734dbf71c2c9d7