In the Linux kernel, the following vulnerability has been resolved: scsi:
target: core: Add TMF to tmr_list handling An abort that is responded to by
iSCSI itself is added to tmr_list but does not go to target core. A
LUN_RESET that goes through tmr_list takes a refcounter on the abort and
waits for completion. However, the abort will be never complete because it
was not started in target core. Unable to locate ITT: 0x05000000 on CID: 0
Unable to locate RefTaskTag: 0x05000000 on CID: 0. wait_for_tasks: Stopping
tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state
ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop wait for
tasks: tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state
ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop …
INFO: task kworker/0:2:49 blocked for more than 491 seconds.
task:kworker/0:2 state:D stack: 0 pid: 49 ppid: 2 flags:0x00000800
Workqueue: events target_tmr_work [target_core_mod] Call Trace:
__switch_to+0x2c4/0x470 _schedule+0x314/0x1730 schedule+0x64/0x130
schedule_timeout+0x168/0x430 wait_for_completion+0x140/0x270
target_put_cmd_and_wait+0x64/0xb0 [target_core_mod]
core_tmr_lun_reset+0x30/0xa0 [target_core_mod] target_tmr_work+0xc8/0x1b0
[target_core_mod] process_one_work+0x2d4/0x5d0 worker_thread+0x78/0x6c0 To
fix this, only add abort to tmr_list if it will be handled by target core.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < 5.4.0-186.206 | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < 5.15.0-112.122 | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < 5.4.0-1126.136 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < 5.15.0-1063.69 | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < 5.15.0-1063.69~20.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.4 | < 5.4.0-1126.136~18.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | < 5.4.0-1131.138 | UNKNOWN |
git.kernel.org/linus/83ab68168a3d990d5ff39ab030ad5754cbbccb25 (6.8-rc1)
git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d
git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf
git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb
git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171
git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25
git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d
git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f
git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a
launchpad.net/bugs/cve/CVE-2024-26845
nvd.nist.gov/vuln/detail/CVE-2024-26845
security-tracker.debian.org/tracker/CVE-2024-26845
ubuntu.com/security/notices/USN-6820-1
ubuntu.com/security/notices/USN-6820-2
ubuntu.com/security/notices/USN-6821-1
ubuntu.com/security/notices/USN-6821-2
ubuntu.com/security/notices/USN-6821-3
ubuntu.com/security/notices/USN-6821-4
ubuntu.com/security/notices/USN-6828-1
ubuntu.com/security/notices/USN-6831-1
ubuntu.com/security/notices/USN-6867-1
ubuntu.com/security/notices/USN-6871-1
www.cve.org/CVERecord?id=CVE-2024-26845