In the Linux kernel, the following vulnerability has been resolved:
scsi: target: core: Add TMF to tmr_list handling
An abort that is responded to by iSCSI itself is added to tmr_list but does
not go to target core. A LUN_RESET that goes through tmr_list takes a
refcounter on the abort and waits for completion. However, the abort will
be never complete because it was not started in target core.
Unable to locate ITT: 0x05000000 on CID: 0
Unable to locate RefTaskTag: 0x05000000 on CID: 0.
wait_for_tasks: Stopping tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop
wait for tasks: tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop
...
INFO: task kworker/0:2:49 blocked for more than 491 seconds.
task:kworker/0:2 state:D stack: 0 pid: 49 ppid: 2 flags:0x00000800
Workqueue: events target_tmr_work [target_core_mod]
Call Trace:
__switch_to+0x2c4/0x470
_schedule+0x314/0x1730
schedule+0x64/0x130
schedule_timeout+0x168/0x430
wait_for_completion+0x140/0x270
target_put_cmd_and_wait+0x64/0xb0 [target_core_mod]
core_tmr_lun_reset+0x30/0xa0 [target_core_mod]
target_tmr_work+0xc8/0x1b0 [target_core_mod]
process_one_work+0x2d4/0x5d0
worker_thread+0x78/0x6c0
To fix this, only add abort to tmr_list if it will be handled by target
core.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
02 Apr 2025, 13:17
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d - Patch | |
References | () https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf - Patch | |
References | () https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb - Patch | |
References | () https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171 - Patch | |
References | () https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25 - Patch | |
References | () https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d - Patch | |
References | () https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f - Patch | |
References | () https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List | |
References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List | |
First Time |
Debian
Linux linux Kernel Debian debian Linux Linux |
|
CWE | NVD-CWE-noinfo |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d - | |
References | () https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf - | |
References | () https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb - | |
References | () https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171 - | |
References | () https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25 - | |
References | () https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d - | |
References | () https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f - | |
References | () https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a - |
05 Nov 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
27 Jun 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
17 Apr 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-17 10:15
Updated : 2025-04-02 13:17
NVD link : CVE-2024-26845
Mitre link : CVE-2024-26845
CVE.ORG link : CVE-2024-26845
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE