CVE-2024-58239
MEDIUMLinux Kernel - Use After Free
Title source: llmDescription
In the Linux kernel, the following vulnerability has been resolved: tls: stop recv() if initial process_rx_list gave us non-DATA If we have a non-DATA record on the rx_list and another record of the same type still on the queue, we will end up merging them: - process_rx_list copies the non-DATA record - we start the loop and process the first available record since it's of the same type - we break out of the loop since the record was not DATA Just check the record type and jump to the end in case process_rx_list did some work.
Exploits (2)
References (7)
Scores
CVSS v3
5.5
EPSS
0.0001
EPSS Percentile
0.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
Status
published
Products (8)
linux/Kernel
5.1.0 - 5.4.270linux
linux/Kernel
5.11.0 - 5.15.150linux
linux/Kernel
5.16.0 - 6.1.80linux
linux/Kernel
5.5.0 - 5.10.211linux
linux/Kernel
6.2.0 - 6.6.19linux
linux/Kernel
6.7.0 - 6.7.7linux
linux/linux_kernel
6.8 rc1 (5 CPE variants)
linux/linux_kernel
5.1 - 5.4.270
Published
Aug 22, 2025
Tracked Since
Feb 18, 2026