CVE-2024-26584

In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our requests to the crypto API, crypto_aead_{encrypt,decrypt} can return -EBUSY instead of -EINPROGRESS in valid situations. For example, when the cryptd queue for AESNI is full (easy to trigger with an artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued to the backlog but still processed. In that case, the async callback will also be called twice: first with err == -EINPROGRESS, which it seems we can just ignore, then with err == 0. Compared to Sabrina's original patch this version uses the new tls_*crypt_async_wait() helpers and converts the EBUSY to EINPROGRESS to avoid having to modify all the error handling paths. The handling is identical.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754 - Patch () https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754 - Patch
References () https://git.kernel.org/stable/c/3ade391adc584f17b5570fd205de3ad029090368 - () https://git.kernel.org/stable/c/3ade391adc584f17b5570fd205de3ad029090368 -
References () https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3 - Patch () https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3 - Patch
References () https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694 - Patch () https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694 - Patch
References () https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72 - Patch () https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72 - Patch

25 May 2024, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3ade391adc584f17b5570fd205de3ad029090368 -

30 Apr 2024, 19:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754 - () https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754 - Patch
References () https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3 - () https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3 - Patch
References () https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694 - () https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694 - Patch
References () https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72 - () https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-755

03 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72 -

11 Mar 2024, 18:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

28 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/ -

23 Feb 2024, 09:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754 -
  • () https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694 -

22 Feb 2024, 19:07

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: tls: manejar el retraso de solicitudes criptográficas Dado que estamos configurando el indicador CRYPTO_TFM_REQ_MAY_BACKLOG en nuestras solicitudes a la API criptográfica, crypto_aead_{encrypt,decrypt} puede devolver -EBUSY en lugar de - EINPROGRESS en situaciones válidas. Por ejemplo, cuando la cola cryptd para AESNI está llena (fácil de activar con un cryptd.cryptd_max_cpu_qlen artificialmente bajo), las solicitudes se pondrán en cola en el trabajo pendiente, pero aún así se procesarán. En ese caso, la devolución de llamada asíncrona también se llamará dos veces: primero con err == -EINPROGRESS, que parece que podemos ignorar, luego con err == 0. En comparación con el parche original de Sabrina, esta versión usa el nuevo tls_*crypt_async_wait( ) ayuda y convierte EBUSY a EINPROGRESS para evitar tener que modificar todas las rutas de manejo de errores. El manejo es idéntico.

21 Feb 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-21 15:15

Updated : 2024-11-21 09:02


NVD link : CVE-2024-26584

Mitre link : CVE-2024-26584

CVE.ORG link : CVE-2024-26584


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-755

Improper Handling of Exceptional Conditions