{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-26877","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-19T14:20:24.185Z","datePublished":"2024-04-17T10:27:35.197Z","dateUpdated":"2026-05-12T11:49:50.041Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T20:05:59.609Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: xilinx - call finalize with bh disabled\n\nWhen calling crypto_finalize_request, BH should be disabled to avoid\ntriggering the following calltrace:\n\n    ------------[ cut here ]------------\n    WARNING: CPU: 2 PID: 74 at crypto/crypto_engine.c:58 crypto_finalize_request+0xa0/0x118\n    Modules linked in: cryptodev(O)\n    CPU: 2 PID: 74 Comm: firmware:zynqmp Tainted: G           O       6.8.0-rc1-yocto-standard #323\n    Hardware name: ZynqMP ZCU102 Rev1.0 (DT)\n    pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n    pc : crypto_finalize_request+0xa0/0x118\n    lr : crypto_finalize_request+0x104/0x118\n    sp : ffffffc085353ce0\n    x29: ffffffc085353ce0 x28: 0000000000000000 x27: ffffff8808ea8688\n    x26: ffffffc081715038 x25: 0000000000000000 x24: ffffff880100db00\n    x23: ffffff880100da80 x22: 0000000000000000 x21: 0000000000000000\n    x20: ffffff8805b14000 x19: ffffff880100da80 x18: 0000000000010450\n    x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\n    x14: 0000000000000003 x13: 0000000000000000 x12: ffffff880100dad0\n    x11: 0000000000000000 x10: ffffffc0832dcd08 x9 : ffffffc0812416d8\n    x8 : 00000000000001f4 x7 : ffffffc0830d2830 x6 : 0000000000000001\n    x5 : ffffffc082091000 x4 : ffffffc082091658 x3 : 0000000000000000\n    x2 : ffffffc7f9653000 x1 : 0000000000000000 x0 : ffffff8802d20000\n    Call trace:\n     crypto_finalize_request+0xa0/0x118\n     crypto_finalize_aead_request+0x18/0x30\n     zynqmp_handle_aes_req+0xcc/0x388\n     crypto_pump_work+0x168/0x2d8\n     kthread_worker_fn+0xfc/0x3a0\n     kthread+0x118/0x138\n     ret_from_fork+0x10/0x20\n    irq event stamp: 40\n    hardirqs last  enabled at (39): [<ffffffc0812416f8>] _raw_spin_unlock_irqrestore+0x70/0xb0\n    hardirqs last disabled at (40): [<ffffffc08122d208>] el1_dbg+0x28/0x90\n    softirqs last  enabled at (36): [<ffffffc080017dec>] kernel_neon_begin+0x8c/0xf0\n    softirqs last disabled at (34): [<ffffffc080017dc0>] kernel_neon_begin+0x60/0xf0\n    ---[ end trace 0000000000000000 ]---"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/crypto/xilinx/zynqmp-aes-gcm.c"],"versions":[{"version":"4d96f7d48131fefe30d7c1d1e2a23ef37164dbf5","lessThan":"8a01335aedc50a66d04dd39203c89f4bc8042596","status":"affected","versionType":"git"},{"version":"4d96f7d48131fefe30d7c1d1e2a23ef37164dbf5","lessThan":"03e6d4e948432a61b35783323b6ab2be071d2619","status":"affected","versionType":"git"},{"version":"4d96f7d48131fefe30d7c1d1e2a23ef37164dbf5","lessThan":"a71f66bd5f7b9b35a8aaa49e29565eca66299399","status":"affected","versionType":"git"},{"version":"4d96f7d48131fefe30d7c1d1e2a23ef37164dbf5","lessThan":"23bc89fdce71124cd2126fc919c7076e7cb489cf","status":"affected","versionType":"git"},{"version":"4d96f7d48131fefe30d7c1d1e2a23ef37164dbf5","lessThan":"9db89b1fb85557892e6681724b367287de5f9f20","status":"affected","versionType":"git"},{"version":"4d96f7d48131fefe30d7c1d1e2a23ef37164dbf5","lessThan":"dbf291d8ffffb70f48286176a15c6c54f0bb0743","status":"affected","versionType":"git"},{"version":"4d96f7d48131fefe30d7c1d1e2a23ef37164dbf5","lessThan":"a853450bf4c752e664abab0b2fad395b7ad7701c","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/crypto/xilinx/zynqmp-aes-gcm.c"],"versions":[{"version":"5.7","status":"affected"},{"version":"0","lessThan":"5.7","status":"unaffected","versionType":"semver"},{"version":"5.10.214","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.153","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.83","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.23","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.11","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8.2","lessThanOrEqual":"6.8.*","status":"unaffected","versionType":"semver"},{"version":"6.9","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"5.10.214"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"5.15.153"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.1.83"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.6.23"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.7.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.8.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7","versionEndExcluding":"6.9"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/8a01335aedc50a66d04dd39203c89f4bc8042596"},{"url":"https://git.kernel.org/stable/c/03e6d4e948432a61b35783323b6ab2be071d2619"},{"url":"https://git.kernel.org/stable/c/a71f66bd5f7b9b35a8aaa49e29565eca66299399"},{"url":"https://git.kernel.org/stable/c/23bc89fdce71124cd2126fc919c7076e7cb489cf"},{"url":"https://git.kernel.org/stable/c/9db89b1fb85557892e6681724b367287de5f9f20"},{"url":"https://git.kernel.org/stable/c/dbf291d8ffffb70f48286176a15c6c54f0bb0743"},{"url":"https://git.kernel.org/stable/c/a853450bf4c752e664abab0b2fad395b7ad7701c"}],"title":"crypto: xilinx - call finalize with bh disabled","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T00:21:05.426Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/8a01335aedc50a66d04dd39203c89f4bc8042596","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/03e6d4e948432a61b35783323b6ab2be071d2619","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/a71f66bd5f7b9b35a8aaa49e29565eca66299399","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/23bc89fdce71124cd2126fc919c7076e7cb489cf","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/9db89b1fb85557892e6681724b367287de5f9f20","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/dbf291d8ffffb70f48286176a15c6c54f0bb0743","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/a853450bf4c752e664abab0b2fad395b7ad7701c","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-26877","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-09-10T15:48:28.996233Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-11T17:33:26.216Z"}},{"x_adpType":"supplier","providerMetadata":{"orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP","dateUpdated":"2026-05-12T11:49:50.041Z"},"affected":[{"vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"}]}]},"dataVersion":"5.2"}