CVE-2024-35908

In the Linux kernel, the following vulnerability has been resolved: tls: get psock ref after taking rxlock to avoid leak At the start of tls_sw_recvmsg, we take a reference on the psock, and then call tls_rx_reader_lock. If that fails, we return directly without releasing the reference. Instead of adding a new label, just take the reference after locking has succeeded, since we don't need it before.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*

History

24 Sep 2025, 18:52

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
References () https://git.kernel.org/stable/c/30fabe50a7ace3e9d57cf7f9288f33ea408491c8 - () https://git.kernel.org/stable/c/30fabe50a7ace3e9d57cf7f9288f33ea408491c8 - Patch
References () https://git.kernel.org/stable/c/417e91e856099e9b8a42a2520e2255e6afe024be - () https://git.kernel.org/stable/c/417e91e856099e9b8a42a2520e2255e6afe024be - Patch
References () https://git.kernel.org/stable/c/b565d294e3d5aa809566a4d819835da11997d8b3 - () https://git.kernel.org/stable/c/b565d294e3d5aa809566a4d819835da11997d8b3 - Patch
References () https://git.kernel.org/stable/c/f1b7f14130d782433bc98c1e1e41ce6b4d4c3096 - () https://git.kernel.org/stable/c/f1b7f14130d782433bc98c1e1e41ce6b4d4c3096 - Patch
First Time Linux
Linux linux Kernel

Information

Published : 2024-05-19 09:15

Updated : 2025-09-24 18:52


NVD link : CVE-2024-35908

Mitre link : CVE-2024-35908

CVE.ORG link : CVE-2024-35908


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime