First published: Wed Feb 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: tls: fix race between tx work scheduling and socket close Similarly to previous commit, the submitting thread (recvmsg/sendmsg) may exit as soon as the async crypto handler calls complete(). Reorder scheduling the work before calling complete(). This seems more logical in the first place, as it's the inverse order of what the submitting thread will do.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <6.8 | 6.8 |
Linux Kernel | >=4.20.0<6.6.18 | |
Linux Kernel | >=6.7.0<6.7.6 | |
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26585 has been classified with moderate severity due to its potential impact on system stability.
To address CVE-2024-26585, you should upgrade to a fixed version of the Linux kernel, specifically versions 6.8 or greater.
CVE-2024-26585 affects various Linux kernel versions between 4.20.0 and 6.7.6 as well as specific Red Hat and Debian packages.
CVE-2024-26585 was disclosed in 2024, highlighting a race condition issue in the Linux kernel.
While CVE-2024-26585 primarily affects system functionality, it may lead to unexpected behavior that could indirectly risk data integrity.