跳转到帖子

Red Hat: CVE-2024-26584: kernel: tls: handle backlogging of crypto requests (Multiple Advisories)

recommended_posts

发布于
  • 超级管理员

Red Hat: CVE-2024-26584: kernel: tls: handle backlogging of crypto requests (Multiple Advisories)

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
02/21/2024
Created
04/19/2024
Added
04/19/2024
Modified
12/05/2024

Description

In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our requests to the crypto API, crypto_aead_{encrypt,decrypt} can return -EBUSY instead of -EINPROGRESS in valid situations. For example, when the cryptd queue for AESNI is full (easy to trigger with an artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued to the backlog but still processed. In that case, the async callback will also be called twice: first with err == -EINPROGRESS, which it seems we can just ignore, then with err == 0. Compared to Sabrina's original patch this version uses the new tls_*crypt_async_wait() helpers and converts the EBUSY to EINPROGRESS to avoid having to modify all the error handling paths. The handling is identical.

Solution(s)

  • redhat-upgrade-kernel
  • redhat-upgrade-kernel-rt

References

  • CVE-2024-26584
  • RHSA-2024:1881
  • RHSA-2024:1882
  • RHSA-2024:2394
  • RHSA-2024:4211
  • RHSA-2024:4352
  • RHSA-2024:5255
View more
  • 查看数 712
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…