CVE-2024-26877

In the Linux kernel, the following vulnerability has been resolved: crypto: xilinx - call finalize with bh disabled When calling crypto_finalize_request, BH should be disabled to avoid triggering the following calltrace: ------------[ cut here ]------------ WARNING: CPU: 2 PID: 74 at crypto/crypto_engine.c:58 crypto_finalize_request+0xa0/0x118 Modules linked in: cryptodev(O) CPU: 2 PID: 74 Comm: firmware:zynqmp Tainted: G O 6.8.0-rc1-yocto-standard #323 Hardware name: ZynqMP ZCU102 Rev1.0 (DT) pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : crypto_finalize_request+0xa0/0x118 lr : crypto_finalize_request+0x104/0x118 sp : ffffffc085353ce0 x29: ffffffc085353ce0 x28: 0000000000000000 x27: ffffff8808ea8688 x26: ffffffc081715038 x25: 0000000000000000 x24: ffffff880100db00 x23: ffffff880100da80 x22: 0000000000000000 x21: 0000000000000000 x20: ffffff8805b14000 x19: ffffff880100da80 x18: 0000000000010450 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000003 x13: 0000000000000000 x12: ffffff880100dad0 x11: 0000000000000000 x10: ffffffc0832dcd08 x9 : ffffffc0812416d8 x8 : 00000000000001f4 x7 : ffffffc0830d2830 x6 : 0000000000000001 x5 : ffffffc082091000 x4 : ffffffc082091658 x3 : 0000000000000000 x2 : ffffffc7f9653000 x1 : 0000000000000000 x0 : ffffff8802d20000 Call trace: crypto_finalize_request+0xa0/0x118 crypto_finalize_aead_request+0x18/0x30 zynqmp_handle_aes_req+0xcc/0x388 crypto_pump_work+0x168/0x2d8 kthread_worker_fn+0xfc/0x3a0 kthread+0x118/0x138 ret_from_fork+0x10/0x20 irq event stamp: 40 hardirqs last enabled at (39): [<ffffffc0812416f8>] _raw_spin_unlock_irqrestore+0x70/0xb0 hardirqs last disabled at (40): [<ffffffc08122d208>] el1_dbg+0x28/0x90 softirqs last enabled at (36): [<ffffffc080017dec>] kernel_neon_begin+0x8c/0xf0 softirqs last disabled at (34): [<ffffffc080017dc0>] kernel_neon_begin+0x60/0xf0 ---[ end trace 0000000000000000 ]---
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Dec 2025, 19:06

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/03e6d4e948432a61b35783323b6ab2be071d2619 - () https://git.kernel.org/stable/c/03e6d4e948432a61b35783323b6ab2be071d2619 - Patch
References () https://git.kernel.org/stable/c/23bc89fdce71124cd2126fc919c7076e7cb489cf - () https://git.kernel.org/stable/c/23bc89fdce71124cd2126fc919c7076e7cb489cf - Patch
References () https://git.kernel.org/stable/c/8a01335aedc50a66d04dd39203c89f4bc8042596 - () https://git.kernel.org/stable/c/8a01335aedc50a66d04dd39203c89f4bc8042596 - Patch
References () https://git.kernel.org/stable/c/9db89b1fb85557892e6681724b367287de5f9f20 - () https://git.kernel.org/stable/c/9db89b1fb85557892e6681724b367287de5f9f20 - Patch
References () https://git.kernel.org/stable/c/a71f66bd5f7b9b35a8aaa49e29565eca66299399 - () https://git.kernel.org/stable/c/a71f66bd5f7b9b35a8aaa49e29565eca66299399 - Patch
References () https://git.kernel.org/stable/c/a853450bf4c752e664abab0b2fad395b7ad7701c - () https://git.kernel.org/stable/c/a853450bf4c752e664abab0b2fad395b7ad7701c - Patch
References () https://git.kernel.org/stable/c/dbf291d8ffffb70f48286176a15c6c54f0bb0743 - () https://git.kernel.org/stable/c/dbf291d8ffffb70f48286176a15c6c54f0bb0743 - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
References () https://git.kernel.org/stable/c/03e6d4e948432a61b35783323b6ab2be071d2619 - () https://git.kernel.org/stable/c/03e6d4e948432a61b35783323b6ab2be071d2619 -
References () https://git.kernel.org/stable/c/23bc89fdce71124cd2126fc919c7076e7cb489cf - () https://git.kernel.org/stable/c/23bc89fdce71124cd2126fc919c7076e7cb489cf -
References () https://git.kernel.org/stable/c/8a01335aedc50a66d04dd39203c89f4bc8042596 - () https://git.kernel.org/stable/c/8a01335aedc50a66d04dd39203c89f4bc8042596 -
References () https://git.kernel.org/stable/c/9db89b1fb85557892e6681724b367287de5f9f20 - () https://git.kernel.org/stable/c/9db89b1fb85557892e6681724b367287de5f9f20 -
References () https://git.kernel.org/stable/c/a71f66bd5f7b9b35a8aaa49e29565eca66299399 - () https://git.kernel.org/stable/c/a71f66bd5f7b9b35a8aaa49e29565eca66299399 -
References () https://git.kernel.org/stable/c/a853450bf4c752e664abab0b2fad395b7ad7701c - () https://git.kernel.org/stable/c/a853450bf4c752e664abab0b2fad395b7ad7701c -
References () https://git.kernel.org/stable/c/dbf291d8ffffb70f48286176a15c6c54f0bb0743 - () https://git.kernel.org/stable/c/dbf291d8ffffb70f48286176a15c6c54f0bb0743 -

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: xilinx - llamada a finalizar con bh deshabilitado Al llamar a crypto_finalize_request, BH debe estar deshabilitado para evitar que se active el siguiente seguimiento de llamadas: ------------[ cut aquí ]------------ ADVERTENCIA: CPU: 2 PID: 74 en crypto/crypto_engine.c:58 crypto_finalize_request+0xa0/0x118 Módulos vinculados en: cryptodev(O) CPU: 2 PID: 74 Comm : firmware:zynqmp Contaminado: GO 6.8.0-rc1-yocto-standard #323 Nombre del hardware: ZynqMP ZCU102 Rev1.0 (DT) pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc: crypto_finalize_request+0xa0/0x118 lr: crypto_finalize_request+0x104/0x118 sp: ffffffc085353ce0 x29: ffffffc085353ce0 x28: 00000000000000000 x27: ffffff8808ea8688 x26: 15038 x25: 0000000000000000 x24: ffffff880100db00 x23: ffffff880100da80 x22: 0000000000000000 x21: 0000000000000000 x20: ffffff8805b14000 x19: ffffff880100da80 x18: 0000000000010450 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000003 x13: 0000000000000000 x12: ffffff880100dad0 x11: 0000000000000000 x10: ffffffc0832dcd08 x9 : ffffffc0812416d8 x8 : 00000000000001f4 x7 : ffffffc0830d2830 x6 : 0000000000000001 x5 : ffffffc082091000 x4 : ffffffc082091658 x3 : 0000000000000000 x2 : ffffffc7f9653000 x1: 0000000000000000 x0: ffffff8802d20000 Rastreo de llamadas: crypto_finalize_request+0xa0/0x118 crypto_finalize_aead_request+0x18/0x30 zynqmp_handle_aes_req+0xcc/0x388 crypto_pump_work+0x 168/0x2d8 kthread_worker_fn+0xfc/0x3a0 kthread+0x118/0x138 ret_from_fork+0x10/0x20 sello de evento irq: 40 hardirqs habilitado por última vez en (39): [] _raw_spin_unlock_irqrestore+0x70/0xb0 hardirqs habilitado por última vez en (40): [] el1_dbg+0x28/0x90 softirqs habilitado por última vez en (36): [] _comenzar +0x8c/0xf0 softirqs se deshabilitó por última vez en (34): [] kernel_neon_begin+0x60/0xf0 ---[ final de seguimiento 0000000000000000 ]---

17 Apr 2024, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 11:15

Updated : 2025-12-23 19:06


NVD link : CVE-2024-26877

Mitre link : CVE-2024-26877

CVE.ORG link : CVE-2024-26877


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel