CVE-2024-26845

In the Linux kernel, the following vulnerability has been resolved: scsi: target: core: Add TMF to tmr_list handling An abort that is responded to by iSCSI itself is added to tmr_list but does not go to target core. A LUN_RESET that goes through tmr_list takes a refcounter on the abort and waits for completion. However, the abort will be never complete because it was not started in target core. Unable to locate ITT: 0x05000000 on CID: 0 Unable to locate RefTaskTag: 0x05000000 on CID: 0. wait_for_tasks: Stopping tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop wait for tasks: tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop ... INFO: task kworker/0:2:49 blocked for more than 491 seconds. task:kworker/0:2 state:D stack: 0 pid: 49 ppid: 2 flags:0x00000800 Workqueue: events target_tmr_work [target_core_mod] Call Trace: __switch_to+0x2c4/0x470 _schedule+0x314/0x1730 schedule+0x64/0x130 schedule_timeout+0x168/0x430 wait_for_completion+0x140/0x270 target_put_cmd_and_wait+0x64/0xb0 [target_core_mod] core_tmr_lun_reset+0x30/0xa0 [target_core_mod] target_tmr_work+0xc8/0x1b0 [target_core_mod] process_one_work+0x2d4/0x5d0 worker_thread+0x78/0x6c0 To fix this, only add abort to tmr_list if it will be handled by target core.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

02 Apr 2025, 13:17

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d - () https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d - Patch
References () https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf - () https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf - Patch
References () https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb - () https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb - Patch
References () https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171 - () https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171 - Patch
References () https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25 - () https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25 - Patch
References () https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d - () https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d - Patch
References () https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f - () https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f - Patch
References () https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a - () https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
First Time Debian
Linux linux Kernel
Debian debian Linux
Linux
CWE NVD-CWE-noinfo

21 Nov 2024, 09:03

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -
References () https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d - () https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d -
References () https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf - () https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf -
References () https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb - () https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb -
References () https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171 - () https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171 -
References () https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25 - () https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25 -
References () https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d - () https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d -
References () https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f - () https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f -
References () https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a - () https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a -

05 Nov 2024, 10:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}

27 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html -

25 Jun 2024, 23:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: scsi: target: core: agregar TMF al manejo de tmr_list. Una cancelación a la que responde iSCSI se agrega a tmr_list pero no va al núcleo de destino. Un LUN_RESET que pasa por tmr_list toma un refcounter al cancelar y espera a que se complete. Sin embargo, la cancelación nunca se completará porque no se inició en el núcleo de destino. No se puede ubicar ITT: 0x05000000 en CID: 0 No se puede ubicar RefTaskTag: 0x05000000 en CID: 0. wait_for_tasks: Deteniendo tmf LUN_RESET con etiqueta 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop esperar tareas: t mf LUN_RESET con etiqueta 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop ... INFORMACIÓN: tarea kworker/0:2:49 bloqueada durante más de 491 segundos. tarea:kworker/0:2 estado:D pila: 0 pid: 49 ppid: 2 banderas:0x00000800 Cola de trabajo: eventos target_tmr_work [target_core_mod] Seguimiento de llamadas: __switch_to+0x2c4/0x470 _schedule+0x314/0x1730 Schedule+0x64/0x130 Schedule_timeout+0x168 /0x430 wait_for_completion+0x140/0x270 target_put_cmd_and_wait+0x64/0xb0 [target_core_mod] core_tmr_lun_reset+0x30/0xa0 [target_core_mod] target_tmr_work+0xc8/0x1b0 [target_core_mod] work_thread+0x78/0x6c0 Para solucionar este problema, solo agregue abort a tmr_list si será manejado por el núcleo objetivo.

17 Apr 2024, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-17 10:15

Updated : 2025-04-02 13:17


NVD link : CVE-2024-26845

Mitre link : CVE-2024-26845

CVE.ORG link : CVE-2024-26845


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel