Skip to main content

CVE-2024-26584: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-26584cvecve-2024-26584
Published: Wed Feb 21 2024 (02/21/2024, 14:59:12 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net: tls: handle backlogging of crypto requests Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our requests to the crypto API, crypto_aead_{encrypt,decrypt} can return -EBUSY instead of -EINPROGRESS in valid situations. For example, when the cryptd queue for AESNI is full (easy to trigger with an artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued to the backlog but still processed. In that case, the async callback will also be called twice: first with err == -EINPROGRESS, which it seems we can just ignore, then with err == 0. Compared to Sabrina's original patch this version uses the new tls_*crypt_async_wait() helpers and converts the EBUSY to EINPROGRESS to avoid having to modify all the error handling paths. The handling is identical.

AI-Powered Analysis

AILast updated: 06/29/2025, 20:55:03 UTC

Technical Analysis

CVE-2024-26584 addresses a vulnerability in the Linux kernel's TLS (Transport Layer Security) implementation related to the handling of cryptographic requests in the kernel's crypto API. Specifically, the issue arises from how the kernel manages backlogging of asynchronous cryptographic operations, particularly when the cryptographic device queue (cryptd queue) for AES-NI (Advanced Encryption Standard New Instructions) is full. Under these conditions, the crypto API may return an -EBUSY error instead of the expected -EINPROGRESS error, which can cause the asynchronous callback to be invoked twice: first with an error indicating the operation is in progress (-EINPROGRESS), and then with a success indication (err == 0). This behavior can lead to confusion in error handling paths and potentially cause incorrect processing of cryptographic operations. The patch resolves this by converting the -EBUSY error back to -EINPROGRESS using new helper functions (tls_*crypt_async_wait()), thereby maintaining consistent error handling without requiring extensive changes to existing code. This fix ensures that cryptographic requests are properly queued and processed even under high load, preventing potential race conditions or mishandling of TLS encryption/decryption operations within the kernel. The vulnerability does not appear to have known exploits in the wild and affects specific Linux kernel versions identified by commit hashes. No CVSS score has been assigned yet, and the vulnerability is primarily related to the internal kernel cryptographic subsystem's robustness and correctness rather than a direct remote code execution or privilege escalation vector.

Potential Impact

For European organizations, the impact of CVE-2024-26584 is primarily related to the reliability and correctness of TLS cryptographic operations within Linux-based systems. Since Linux is widely used in servers, cloud infrastructure, and networking equipment across Europe, any instability or incorrect handling in the kernel's TLS implementation could lead to degraded service availability or potential data integrity issues during encrypted communications. While this vulnerability does not directly enable remote code execution or privilege escalation, mishandling of cryptographic operations could theoretically cause TLS sessions to fail or behave unpredictably, impacting secure communications. This is particularly critical for sectors relying heavily on secure data transmission such as finance, healthcare, telecommunications, and government services. However, given the nature of the vulnerability and the absence of known exploits, the immediate risk is moderate. Organizations running Linux kernels with the affected versions should prioritize patching to ensure cryptographic operations remain reliable and to prevent any indirect impacts on confidentiality or availability of encrypted data streams.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Identify Linux systems running affected kernel versions by checking kernel commit hashes or Linux distribution security advisories. 2) Apply the official Linux kernel patches that address CVE-2024-26584 as soon as they become available from trusted sources or Linux distribution vendors. 3) For environments using custom or embedded Linux kernels, coordinate with vendors or internal development teams to integrate the patch promptly. 4) Monitor cryptographic subsystem logs and TLS-related kernel messages for anomalies that might indicate issues with cryptographic request handling. 5) Implement robust testing of TLS-dependent applications and services after patching to verify stability and correct operation under load conditions. 6) Maintain up-to-date kernel versions and subscribe to Linux security mailing lists or advisories to stay informed about related vulnerabilities. 7) Consider limiting the cryptd queue length or tuning cryptographic subsystem parameters cautiously to avoid triggering backlog conditions until patches are applied. These targeted actions go beyond generic advice by focusing on kernel-level patching, monitoring, and configuration tuning specific to the cryptographic subsystem involved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-19T14:20:24.125Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982bc4522896dcbe40b0

Added to database: 5/21/2025, 9:08:59 AM

Last enriched: 6/29/2025, 8:55:03 PM

Last updated: 8/11/2025, 11:46:15 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats