CVE-2024-26584

Updated: 2024-11-30 02:12:46.025587

Description:

In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our requests to the crypto API, crypto_aead_{encrypt,decrypt} can return -EBUSY instead of -EINPROGRESS in valid situations. For example, when the cryptd queue for AESNI is full (easy to trigger with an artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued to the backlog but still processed. In that case, the async callback will also be called twice: first with err == -EINPROGRESS, which it seems we can just ignore, then with err == 0. Compared to Sabrina's original patch this version uses the new tls_*crypt_async_wait() helpers and converts the EBUSY to EINPROGRESS to avoid having to modify all the error handling paths. The handling is identical.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Released CLSA-2025:1743193221 2024-06-24 11:24:57
CentOS 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-04-18 14:10:58
CentOS 7 ELS kernel 3.10.0 5.5 MEDIUM Ignored 2024-05-03 09:59:13
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-07-09 05:21:29
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-07-09 05:21:29
CentOS Stream 8 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2024-07-03 10:10:45
CloudLinux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-06-24 10:15:11
Oracle Linux 6 ELS kernel 2.6.32 5.5 MEDIUM Ignored 2024-04-18 14:10:57
Ubuntu 16.04 ELS linux 4.4.0 5.5 MEDIUM Not Vulnerable 2024-07-30 17:23:08
Ubuntu 18.04 ELS linux 4.15.0 5.5 MEDIUM Not Vulnerable 2024-07-30 14:22:36