CVE-2024-26584

Public on 2024-02-21
Modified on 2024-03-05
Description
In the Linux kernel, the following vulnerability has been resolved:

net: tls: handle backlogging of crypto requests

Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our
requests to the crypto API, crypto_aead_{encrypt,decrypt} can return
-EBUSY instead of -EINPROGRESS in valid situations. For example, when
the cryptd queue for AESNI is full (easy to trigger with an
artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued
to the backlog but still processed. In that case, the async callback
will also be called twice: first with err == -EINPROGRESS, which it
seems we can just ignore, then with err == 0.

Compared to Sabrina's original patch this version uses the new
tls_*crypt_async_wait() helpers and converts the EBUSY to
EINPROGRESS to avoid having to modify all the error handling
paths. The handling is identical.
Severity
Medium severity
Medium
CVSS v3 Base Score
6.5
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 1 kernel Not Affected
Amazon Linux 2 - Core kernel Not Affected
Amazon Linux 2 - Kernel-5.10 Extra kernel 2024-05-09 ALAS2KERNEL-5.10-2024-057 Fixed
Amazon Linux 2 - Kernel-5.15 Extra kernel 2024-05-09 ALAS2KERNEL-5.15-2024-043 Fixed
Amazon Linux 2 - Kernel-5.4 Extra kernel 2024-05-09 ALAS2KERNEL-5.4-2024-065 Fixed
Amazon Linux 2023 kernel 2024-04-10 ALAS2023-2024-585 Fixed
Amazon Linux 2023 kernel 2024-08-01 ALAS2023-2024-696 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
NVD CVSSv3 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H