First published: Sat Dec 28 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY Since commit 8f4f68e788c3 ("crypto: pcrypt - Fix hungtask for PADATA_RESET"), the pcrypt encryption and decryption operations return -EAGAIN when the CPU goes online or offline. In alg_test(), a WARN is generated when pcrypt_aead_decrypt() or pcrypt_aead_encrypt() returns -EAGAIN, the unnecessary panic will occur when panic_on_warn set 1. Fix this issue by calling crypto layer directly without parallelization in that case.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-56690 has a moderate severity rating due to its impact on the Linux kernel's crypto operations.
To fix CVE-2024-56690, update the Linux kernel to the latest version that includes the patch.
CVE-2024-56690 affects all versions of the Linux kernel prior to the patch release addressing this vulnerability.
Exploitation of CVE-2024-56690 could lead to denial of service in encryption and decryption operations.
Currently, there are no known effective workarounds for CVE-2024-56690 other than applying the kernel update.