In the Linux kernel, the following vulnerability has been resolved:
tls: stop recv() if initial process_rx_list gave us non-DATA
If we have a non-DATA record on the rx_list and another record of the
same type still on the queue, we will end up merging them:
- process_rx_list copies the non-DATA record
- we start the loop and process the first available record since it's
of the same type
- we break out of the loop since the record was not DATA
Just check the record type and jump to the end in case process_rx_list
did some work.
References
Configurations
Configuration 1 (hide)
|
History
26 Nov 2025, 17:42
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* |
|
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux linux Kernel
Linux |
|
| References | () https://git.kernel.org/stable/c/31e10d6cb0c9532ff070cf50da1657c3acee9276 - Patch | |
| References | () https://git.kernel.org/stable/c/3b952d8fdfcf6fd8ea0b8954bc9277642cf0977f - Patch | |
| References | () https://git.kernel.org/stable/c/4338032aa90bd1d5b33a4274e8fa8347cda5ee09 - Patch | |
| References | () https://git.kernel.org/stable/c/6756168add1c6c3ef1c32c335bb843a5d1f99a75 - Patch | |
| References | () https://git.kernel.org/stable/c/a4ed943882a8fc057ea5a67643314245e048bbdd - Patch | |
| References | () https://git.kernel.org/stable/c/f310143961e2d9a0479fca117ce869f8aaecc140 - Patch | |
| References | () https://git.kernel.org/stable/c/fdfbaec5923d9359698cbb286bc0deadbb717504 - Patch |
Information
Published : 2025-08-22 14:15
Updated : 2025-11-26 17:42
NVD link : CVE-2024-58239
Mitre link : CVE-2024-58239
CVE.ORG link : CVE-2024-58239
JSON object : View
Products Affected
linux
- linux_kernel
CWE
