{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-56690","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-12-27T15:00:39.848Z","datePublished":"2024-12-28T09:46:16.246Z","dateUpdated":"2025-11-03T20:52:36.988Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T13:01:14.803Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY\n\nSince commit 8f4f68e788c3 (\"crypto: pcrypt - Fix hungtask for\nPADATA_RESET\"), the pcrypt encryption and decryption operations return\n-EAGAIN when the CPU goes online or offline. In alg_test(), a WARN is\ngenerated when pcrypt_aead_decrypt() or pcrypt_aead_encrypt() returns\n-EAGAIN, the unnecessary panic will occur when panic_on_warn set 1.\nFix this issue by calling crypto layer directly without parallelization\nin that case."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["crypto/pcrypt.c"],"versions":[{"version":"039fec48e062504f14845124a1a25eb199b2ddc0","lessThan":"dd8bf8eb5beba1e7c3b11a9a5a58ccbf345a69e6","status":"affected","versionType":"git"},{"version":"c9c1334697301c10e6918d747ed38abfbc0c96e7","lessThan":"fca8aed12218f96b38e374ff264d78ea1fbd23cc","status":"affected","versionType":"git"},{"version":"e97bf4ada7dddacd184c3e196bd063b0dc71b41d","lessThan":"a92ccd3618e42333ac6f150ecdac14dca298bc7a","status":"affected","versionType":"git"},{"version":"546c1796ad1ed0d87dab3c4b5156d75819be2316","lessThan":"96001f52ae8c70e2c736d3e1e5dc53d5b521e5ca","status":"affected","versionType":"git"},{"version":"c55fc098fd9d2dca475b82d00ffbcaf97879d77e","lessThan":"92834692a539b5b7f409e467a14667d64713b732","status":"affected","versionType":"git"},{"version":"372636debe852913529b1716f44addd94fff2d28","lessThan":"5edae7a9a35606017ee6e05911c290acee9fee5a","status":"affected","versionType":"git"},{"version":"8f4f68e788c3a7a696546291258bfa5fdb215523","lessThan":"a8e0074ffb38c9a5964a221bb998034d016c93a2","status":"affected","versionType":"git"},{"version":"8f4f68e788c3a7a696546291258bfa5fdb215523","lessThan":"7ddab756f2de5b7b43c122ebebdf37f400fb2b6f","status":"affected","versionType":"git"},{"version":"8f4f68e788c3a7a696546291258bfa5fdb215523","lessThan":"662f2f13e66d3883b9238b0b96b17886179e60e2","status":"affected","versionType":"git"},{"version":"fb2d3a50a8f29a3c66682bb426144f40e32ab818","status":"affected","versionType":"git"},{"version":"e134f3aba98e6c801a693f540912c2d493718ddf","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["crypto/pcrypt.c"],"versions":[{"version":"6.7","status":"affected"},{"version":"0","lessThan":"6.7","status":"unaffected","versionType":"semver"},{"version":"4.19.325","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.287","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.231","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.174","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.120","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.64","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.11.11","lessThanOrEqual":"6.11.*","status":"unaffected","versionType":"semver"},{"version":"6.12.2","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.300","versionEndExcluding":"4.19.325"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.262","versionEndExcluding":"5.4.287"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.202","versionEndExcluding":"5.10.231"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.140","versionEndExcluding":"5.15.174"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.64","versionEndExcluding":"6.1.120"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.3","versionEndExcluding":"6.6.64"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.11.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.12.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.13"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.14.331"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5.13"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/dd8bf8eb5beba1e7c3b11a9a5a58ccbf345a69e6"},{"url":"https://git.kernel.org/stable/c/fca8aed12218f96b38e374ff264d78ea1fbd23cc"},{"url":"https://git.kernel.org/stable/c/a92ccd3618e42333ac6f150ecdac14dca298bc7a"},{"url":"https://git.kernel.org/stable/c/96001f52ae8c70e2c736d3e1e5dc53d5b521e5ca"},{"url":"https://git.kernel.org/stable/c/92834692a539b5b7f409e467a14667d64713b732"},{"url":"https://git.kernel.org/stable/c/5edae7a9a35606017ee6e05911c290acee9fee5a"},{"url":"https://git.kernel.org/stable/c/a8e0074ffb38c9a5964a221bb998034d016c93a2"},{"url":"https://git.kernel.org/stable/c/7ddab756f2de5b7b43c122ebebdf37f400fb2b6f"},{"url":"https://git.kernel.org/stable/c/662f2f13e66d3883b9238b0b96b17886179e60e2"}],"title":"crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:52:36.988Z"}}]}}