U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2024-26845 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: target: core: Add TMF to tmr_list handling An abort that is responded to by iSCSI itself is added to tmr_list but does not go to target core. A LUN_RESET that goes through tmr_list takes a refcounter on the abort and waits for completion. However, the abort will be never complete because it was not started in target core. Unable to locate ITT: 0x05000000 on CID: 0 Unable to locate RefTaskTag: 0x05000000 on CID: 0. wait_for_tasks: Stopping tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop wait for tasks: tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop ... INFO: task kworker/0:2:49 blocked for more than 491 seconds. task:kworker/0:2 state:D stack: 0 pid: 49 ppid: 2 flags:0x00000800 Workqueue: events target_tmr_work [target_core_mod] Call Trace: __switch_to+0x2c4/0x470 _schedule+0x314/0x1730 schedule+0x64/0x130 schedule_timeout+0x168/0x430 wait_for_completion+0x140/0x270 target_put_cmd_and_wait+0x64/0xb0 [target_core_mod] core_tmr_lun_reset+0x30/0xa0 [target_core_mod] target_tmr_work+0xc8/0x1b0 [target_core_mod] process_one_work+0x2d4/0x5d0 worker_thread+0x78/0x6c0 To fix this, only add abort to tmr_list if it will be handled by target core.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d
https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d
https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf
https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf
https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb
https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb
https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171
https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171
https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25
https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25
https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d
https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d
https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f
https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f
https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a
https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

Weakness Enumeration

CWE-ID CWE Name Source

Change History

7 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2024-26845
NVD Published Date:
04/17/2024
NVD Last Modified:
11/21/2024
Source:
kernel.org