Executive Summary

Informations
Name CVE-2024-26584 First vendor Publication 2024-02-21
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

net: tls: handle backlogging of crypto requests

Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our requests to the crypto API, crypto_aead_{encrypt,decrypt} can return
-EBUSY instead of -EINPROGRESS in valid situations. For example, when the cryptd queue for AESNI is full (easy to trigger with an artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued to the backlog but still processed. In that case, the async callback will also be called twice: first with err == -EINPROGRESS, which it seems we can just ignore, then with err == 0.

Compared to Sabrina's original patch this version uses the new tls_*crypt_async_wait() helpers and converts the EBUSY to EINPROGRESS to avoid having to modify all the error handling paths. The handling is identical.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-755 Improper Handling of Exceptional Conditions

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3604

Sources (Detail)

https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/3ade391adc584f17b5570fd205de3ad029090368
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Date Informations
2024-12-12 03:03:24
  • Multiple Updates
2024-11-25 09:26:56
  • Multiple Updates
2024-11-22 21:24:43
  • Multiple Updates
2024-11-21 21:24:39
  • Multiple Updates
2024-11-20 02:57:09
  • Multiple Updates
2024-11-14 02:57:30
  • Multiple Updates
2024-11-09 02:57:31
  • Multiple Updates
2024-10-26 02:54:54
  • Multiple Updates
2024-10-25 02:56:49
  • Multiple Updates
2024-10-23 02:56:02
  • Multiple Updates
2024-10-03 02:51:25
  • Multiple Updates
2024-10-02 02:49:49
  • Multiple Updates
2024-09-15 02:47:42
  • Multiple Updates
2024-09-12 02:47:15
  • Multiple Updates
2024-09-04 02:48:47
  • Multiple Updates
2024-08-22 02:46:51
  • Multiple Updates
2024-08-02 13:55:55
  • Multiple Updates
2024-08-02 01:35:15
  • Multiple Updates
2024-05-25 21:27:36
  • Multiple Updates
2024-05-01 00:27:34
  • Multiple Updates
2024-04-03 21:27:27
  • Multiple Updates
2024-03-11 21:27:30
  • Multiple Updates
2024-02-28 09:27:29
  • Multiple Updates
2024-02-23 13:27:24
  • Multiple Updates
2024-02-23 00:27:23
  • Multiple Updates
2024-02-21 21:27:30
  • First insertion