In the Linux kernel, the following vulnerability has been resolved:
crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY
Since commit 8f4f68e788c3 ("crypto: pcrypt - Fix hungtask for
PADATA_RESET"), the pcrypt encryption and decryption operations return
-EAGAIN when the CPU goes online or offline. In alg_test(), a WARN is
generated when pcrypt_aead_decrypt() or pcrypt_aead_encrypt() returns
-EAGAIN, the unnecessary panic will occur when panic_on_warn set 1.
Fix this issue by calling crypto layer directly without parallelization
in that case.
crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY
Since commit 8f4f68e788c3 ("crypto: pcrypt - Fix hungtask for
PADATA_RESET"), the pcrypt encryption and decryption operations return
-EAGAIN when the CPU goes online or offline. In alg_test(), a WARN is
generated when pcrypt_aead_decrypt() or pcrypt_aead_encrypt() returns
-EAGAIN, the unnecessary panic will occur when panic_on_warn set 1.
Fix this issue by calling crypto layer directly without parallelization
in that case.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-4075-1 | linux security update |
![]() |
DLA-4076-1 | linux-6.1 security update |
![]() |
EUVD-2024-53338 | Malicious code in bioql (PyPI) |
![]() |
USN-7276-1 | Linux kernel vulnerabilities |
![]() |
USN-7277-1 | Linux kernel vulnerabilities |
![]() |
USN-7310-1 | Linux kernel vulnerabilities |
![]() |
USN-7387-1 | Linux kernel vulnerabilities |
![]() |
USN-7387-2 | Linux kernel (FIPS) vulnerabilities |
![]() |
USN-7387-3 | Linux kernel (Real-time) vulnerabilities |
![]() |
USN-7388-1 | Linux kernel vulnerabilities |
![]() |
USN-7389-1 | Linux kernel (NVIDIA Tegra) vulnerabilities |
![]() |
USN-7390-1 | Linux kernel (Xilinx ZynqMP) vulnerabilities |
![]() |
USN-7391-1 | Linux kernel vulnerabilities |
![]() |
USN-7392-1 | Linux kernel vulnerabilities |
![]() |
USN-7392-2 | Linux kernel vulnerabilities |
![]() |
USN-7392-3 | Linux kernel (AWS) vulnerabilities |
![]() |
USN-7392-4 | Linux kernel (AWS FIPS) vulnerabilities |
![]() |
USN-7393-1 | Linux kernel (FIPS) vulnerabilities |
![]() |
USN-7401-1 | Linux kernel (AWS) vulnerabilities |
![]() |
USN-7407-1 | Linux kernel (HWE) vulnerabilities |
![]() |
USN-7413-1 | Linux kernel (IoT) vulnerabilities |
![]() |
USN-7421-1 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-7449-1 | Linux kernel vulnerabilities |
![]() |
USN-7449-2 | Linux kernel (HWE) vulnerabilities |
![]() |
USN-7450-1 | Linux kernel vulnerabilities |
![]() |
USN-7451-1 | Linux kernel vulnerabilities |
![]() |
USN-7452-1 | Linux kernel vulnerabilities |
![]() |
USN-7453-1 | Linux kernel (Real-time) vulnerabilities |
![]() |
USN-7458-1 | Linux kernel (IBM) vulnerabilities |
![]() |
USN-7459-1 | Linux kernel (Intel IoTG) vulnerabilities |
![]() |
USN-7459-2 | Linux kernel (GCP) vulnerabilities |
![]() |
USN-7463-1 | Linux kernel (IBM) vulnerabilities |
![]() |
USN-7468-1 | Linux kernel (Azure, N-Series) vulnerabilities |
![]() |
USN-7523-1 | Linux kernel (Raspberry Pi Real-time) vulnerabilities |
![]() |
USN-7524-1 | Linux kernel (Raspberry Pi) vulnerabilities |
![]() |
USN-7539-1 | Linux kernel (Raspberry Pi) vulnerabilities |
![]() |
USN-7540-1 | Linux kernel (Raspberry Pi) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 06 Oct 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
Thu, 13 Feb 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-703 | |
Metrics |
threat_severity
|
threat_severity
|
Thu, 09 Jan 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Sat, 28 Dec 2024 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY Since commit 8f4f68e788c3 ("crypto: pcrypt - Fix hungtask for PADATA_RESET"), the pcrypt encryption and decryption operations return -EAGAIN when the CPU goes online or offline. In alg_test(), a WARN is generated when pcrypt_aead_decrypt() or pcrypt_aead_encrypt() returns -EAGAIN, the unnecessary panic will occur when panic_on_warn set 1. Fix this issue by calling crypto layer directly without parallelization in that case. | |
Title | crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T13:01:14.803Z
Reserved: 2024-12-27T15:00:39.848Z
Link: CVE-2024-56690

No data.

Status : Analyzed
Published: 2024-12-28T10:15:13.537
Modified: 2025-10-06T17:40:34.297
Link: CVE-2024-56690


Updated: 2025-07-12T23:06:34Z