Advisory Published
CVE Published
Updated

CVE-2024-26877: crypto: xilinx - call finalize with bh disabled

First published: Wed Apr 17 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: crypto: xilinx - call finalize with bh disabled When calling crypto_finalize_request, BH should be disabled to avoid triggering the following calltrace: ------------[ cut here ]------------ WARNING: CPU: 2 PID: 74 at crypto/crypto_engine.c:58 crypto_finalize_request+0xa0/0x118 Modules linked in: cryptodev(O) CPU: 2 PID: 74 Comm: firmware:zynqmp Tainted: G O 6.8.0-rc1-yocto-standard #323 Hardware name: ZynqMP ZCU102 Rev1.0 (DT) pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : crypto_finalize_request+0xa0/0x118 lr : crypto_finalize_request+0x104/0x118 sp : ffffffc085353ce0 x29: ffffffc085353ce0 x28: 0000000000000000 x27: ffffff8808ea8688 x26: ffffffc081715038 x25: 0000000000000000 x24: ffffff880100db00 x23: ffffff880100da80 x22: 0000000000000000 x21: 0000000000000000 x20: ffffff8805b14000 x19: ffffff880100da80 x18: 0000000000010450 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000003 x13: 0000000000000000 x12: ffffff880100dad0 x11: 0000000000000000 x10: ffffffc0832dcd08 x9 : ffffffc0812416d8 x8 : 00000000000001f4 x7 : ffffffc0830d2830 x6 : 0000000000000001 x5 : ffffffc082091000 x4 : ffffffc082091658 x3 : 0000000000000000 x2 : ffffffc7f9653000 x1 : 0000000000000000 x0 : ffffff8802d20000 Call trace: crypto_finalize_request+0xa0/0x118 crypto_finalize_aead_request+0x18/0x30 zynqmp_handle_aes_req+0xcc/0x388 crypto_pump_work+0x168/0x2d8 kthread_worker_fn+0xfc/0x3a0 kthread+0x118/0x138 ret_from_fork+0x10/0x20 irq event stamp: 40 hardirqs last enabled at (39): [<ffffffc0812416f8>] _raw_spin_unlock_irqrestore+0x70/0xb0 hardirqs last disabled at (40): [<ffffffc08122d208>] el1_dbg+0x28/0x90 softirqs last enabled at (36): [<ffffffc080017dec>] kernel_neon_begin+0x8c/0xf0 softirqs last disabled at (34): [<ffffffc080017dc0>] kernel_neon_begin+0x60/0xf0 ---[ end trace 0000000000000000 ]---

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
debian/linux
5.10.218-1
5.10.221-1
6.1.94-1
6.1.99-1
6.9.10-1
6.9.12-1
ubuntu/linux<5.15.0-112.122
5.15.0-112.122
ubuntu/linux<6.8.0-35.35
6.8.0-35.35
ubuntu/linux<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-aws<5.15.0-1063.69
5.15.0-1063.69
ubuntu/linux-aws<6.8.0-1009.9
6.8.0-1009.9
ubuntu/linux-aws<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-aws-5.15<5.15.0-1063.69~20.04.1
5.15.0-1063.69~20.04.1
ubuntu/linux-aws-5.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-aws-5.4<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-aws-6.5<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-aws-fips<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-aws-hwe<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-azure<5.15.0-1066.75
5.15.0-1066.75
ubuntu/linux-azure<6.8.0-1008.8
6.8.0-1008.8
ubuntu/linux-azure<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-azure-4.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-azure-5.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-azure-5.4<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-azure-6.5<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-azure-fde<5.15.0-1067.76.1
5.15.0-1067.76.1
ubuntu/linux-azure-fde<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-azure-fde-5.15<5.15.0-1065.74~20.04.1.1
5.15.0-1065.74~20.04.1.1
ubuntu/linux-azure-fde-5.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-azure-fips<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-bluefield<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-fips<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-gcp<5.15.0-1062.70
5.15.0-1062.70
ubuntu/linux-gcp<6.8.0-1008.9
6.8.0-1008.9
ubuntu/linux-gcp<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-gcp-4.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-gcp-5.15<5.15.0-1062.70~20.04.1
5.15.0-1062.70~20.04.1
ubuntu/linux-gcp-5.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-gcp-5.4<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-gcp-6.5<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-gcp-fips<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-gke<5.15.0-1060.66
5.15.0-1060.66
ubuntu/linux-gke<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-gkeop<5.15.0-1046.53
5.15.0-1046.53
ubuntu/linux-gkeop<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-gkeop-5.15<5.15.0-1046.53~20.04.1
5.15.0-1046.53~20.04.1
ubuntu/linux-gkeop-5.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-hwe<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-hwe-5.15<5.15.0-113.123~20.04.1
5.15.0-113.123~20.04.1
ubuntu/linux-hwe-5.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-hwe-5.4<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-hwe-6.5<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-ibm<5.15.0-1056.59
5.15.0-1056.59
ubuntu/linux-ibm<6.8.0-1006.6
6.8.0-1006.6
ubuntu/linux-ibm<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-ibm-5.15<5.15.0-1057.60~20.04.1
5.15.0-1057.60~20.04.1
ubuntu/linux-ibm-5.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-ibm-5.4<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-intel<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-intel-iotg<5.15.0-1058.64
5.15.0-1058.64
ubuntu/linux-intel-iotg<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-intel-iotg-5.15<5.15.0-1058.64~20.04.1
5.15.0-1058.64~20.04.1
ubuntu/linux-intel-iotg-5.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-iot<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-kvm<5.15.0-1060.65
5.15.0-1060.65
ubuntu/linux-kvm<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-laptop<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-lowlatency<5.15.0-110.120
5.15.0-110.120
ubuntu/linux-lowlatency<6.8.0-35.35.1
6.8.0-35.35.1
ubuntu/linux-lowlatency<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-lowlatency-hwe-5.15<5.15.0-110.120~20.04.1
5.15.0-110.120~20.04.1
ubuntu/linux-lowlatency-hwe-5.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-lowlatency-hwe-6.5<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-lts-xenial<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-nvidia<5.15.0-1058.59
5.15.0-1058.59
ubuntu/linux-nvidia<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-nvidia-6.5<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-nvidia-6.8<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-nvidia-lowlatency<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-oem-6.5<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-oem-6.8<6.8.0-1006.6
6.8.0-1006.6
ubuntu/linux-oem-6.8<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-oracle<5.15.0-1061.67
5.15.0-1061.67
ubuntu/linux-oracle<6.8.0-1006.6
6.8.0-1006.6
ubuntu/linux-oracle<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-oracle-5.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-oracle-5.4<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-oracle-6.5<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-raspi<5.15.0-1058.61
5.15.0-1058.61
ubuntu/linux-raspi<6.8.0-1005.5
6.8.0-1005.5
ubuntu/linux-raspi<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-raspi-5.4<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-riscv<6.8.0-35.35.1
6.8.0-35.35.1
ubuntu/linux-riscv<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-riscv-5.15<5.15.0-1059.63~20.04.1
5.15.0-1059.63~20.04.1
ubuntu/linux-riscv-5.15<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-riscv-6.5<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-starfive<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-starfive-6.5<6.9~<6.8.2
6.9~
6.8.2
ubuntu/linux-xilinx-zynqmp<5.15.0-1030.34
5.15.0-1030.34
ubuntu/linux-xilinx-zynqmp<6.9~<6.8.2
6.9~
6.8.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203