Vulnerability Details : CVE-2024-35908
In the Linux kernel, the following vulnerability has been resolved:
tls: get psock ref after taking rxlock to avoid leak
At the start of tls_sw_recvmsg, we take a reference on the psock, and
then call tls_rx_reader_lock. If that fails, we return directly
without releasing the reference.
Instead of adding a new label, just take the reference after locking
has succeeded, since we don't need it before.
Products affected by CVE-2024-35908
Please log in to view affected product information.
Exploit prediction scoring system (EPSS) score for CVE-2024-35908
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
References for CVE-2024-35908
-
https://git.kernel.org/stable/c/f1b7f14130d782433bc98c1e1e41ce6b4d4c3096
tls: get psock ref after taking rxlock to avoid leak - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/30fabe50a7ace3e9d57cf7f9288f33ea408491c8
tls: get psock ref after taking rxlock to avoid leak - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/b565d294e3d5aa809566a4d819835da11997d8b3
tls: get psock ref after taking rxlock to avoid leak - kernel/git/stable/linux.git - Linux kernel stable tree
-
https://git.kernel.org/stable/c/417e91e856099e9b8a42a2520e2255e6afe024be
tls: get psock ref after taking rxlock to avoid leak - kernel/git/stable/linux.git - Linux kernel stable tree
Jump to