CVE-2024-26788
"Freescale Systems QDMA DMA Engine IRQ Handler Panic Vulnerability"
Description
In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-qdma: init irq after reg initialization Initialize the qDMA irqs after the registers are configured so that interrupts that may have been pending from a primary kernel don't get processed by the irq handler before it is ready to and cause panic with the following trace: Call trace: fsl_qdma_queue_handler+0xf8/0x3e8 __handle_irq_event_percpu+0x78/0x2b0 handle_irq_event_percpu+0x1c/0x68 handle_irq_event+0x44/0x78 handle_fasteoi_irq+0xc8/0x178 generic_handle_irq+0x24/0x38 __handle_domain_irq+0x90/0x100 gic_handle_irq+0x5c/0xb8 el1_irq+0xb8/0x180 _raw_spin_unlock_irqrestore+0x14/0x40 __setup_irq+0x4bc/0x798 request_threaded_irq+0xd8/0x190 devm_request_threaded_irq+0x74/0xe8 fsl_qdma_probe+0x4d4/0xca8 platform_drv_probe+0x50/0xa0 really_probe+0xe0/0x3f8 driver_probe_device+0x64/0x130 device_driver_attach+0x6c/0x78 __driver_attach+0xbc/0x158 bus_for_each_dev+0x5c/0x98 driver_attach+0x20/0x28 bus_add_driver+0x158/0x220 driver_register+0x60/0x110 __platform_driver_register+0x44/0x50 fsl_qdma_driver_init+0x18/0x20 do_one_initcall+0x48/0x258 kernel_init_freeable+0x1a4/0x23c kernel_init+0x10/0xf8 ret_from_fork+0x10/0x18
INFO
Published Date :
April 4, 2024, 9:15 a.m.
Last Modified :
April 1, 2025, 8:35 p.m.
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Remotely Exploitable :
No
Impact Score :
3.6
Exploitability Score :
1.8
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-26788
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-26788
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2024-26788
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Apr. 01, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE CWE-908 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.151 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.212 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.1 up to (excluding) 5.4.271 *cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.81 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.21 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.7.9 *cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* Added Reference Type CVE: https://git.kernel.org/stable/c/3cc5fb824c2125aa3740d905b3e5b378c8a09478 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/3cc5fb824c2125aa3740d905b3e5b378c8a09478 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/4529c084a320be78ff2c5e64297ae998c6fdf66b Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/4529c084a320be78ff2c5e64297ae998c6fdf66b Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/474d521da890b3e3585335fb80a6044cb2553d99 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/474d521da890b3e3585335fb80a6044cb2553d99 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/677102a930643c31f1b4c512b041407058bdfef8 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/677102a930643c31f1b4c512b041407058bdfef8 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/87a39071e0b639f45e05d296cc0538eef44ec0bd Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/87a39071e0b639f45e05d296cc0538eef44ec0bd Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/9579a21e99fe8dab22a253050ddff28d340d74e1 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/9579a21e99fe8dab22a253050ddff28d340d74e1 Types: Patch Added Reference Type CVE: https://git.kernel.org/stable/c/a69c8bbb946936ac4eb6a6ae1e849435aa8d947d Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/a69c8bbb946936ac4eb6a6ae1e849435aa8d947d Types: Patch Added Reference Type CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Types: Mailing List -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/3cc5fb824c2125aa3740d905b3e5b378c8a09478 Added Reference https://git.kernel.org/stable/c/4529c084a320be78ff2c5e64297ae998c6fdf66b Added Reference https://git.kernel.org/stable/c/474d521da890b3e3585335fb80a6044cb2553d99 Added Reference https://git.kernel.org/stable/c/677102a930643c31f1b4c512b041407058bdfef8 Added Reference https://git.kernel.org/stable/c/87a39071e0b639f45e05d296cc0538eef44ec0bd Added Reference https://git.kernel.org/stable/c/9579a21e99fe8dab22a253050ddff28d340d74e1 Added Reference https://git.kernel.org/stable/c/a69c8bbb946936ac4eb6a6ae1e849435aa8d947d Added Reference https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Nov. 05, 2024
Action Type Old Value New Value Removed Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jun. 25, 2024
Action Type Old Value New Value Added Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html [No types assigned] -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 29, 2024
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
May. 14, 2024
Action Type Old Value New Value -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Apr. 04, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: dmaengine: fsl-qdma: init irq after reg initialization Initialize the qDMA irqs after the registers are configured so that interrupts that may have been pending from a primary kernel don't get processed by the irq handler before it is ready to and cause panic with the following trace: Call trace: fsl_qdma_queue_handler+0xf8/0x3e8 __handle_irq_event_percpu+0x78/0x2b0 handle_irq_event_percpu+0x1c/0x68 handle_irq_event+0x44/0x78 handle_fasteoi_irq+0xc8/0x178 generic_handle_irq+0x24/0x38 __handle_domain_irq+0x90/0x100 gic_handle_irq+0x5c/0xb8 el1_irq+0xb8/0x180 _raw_spin_unlock_irqrestore+0x14/0x40 __setup_irq+0x4bc/0x798 request_threaded_irq+0xd8/0x190 devm_request_threaded_irq+0x74/0xe8 fsl_qdma_probe+0x4d4/0xca8 platform_drv_probe+0x50/0xa0 really_probe+0xe0/0x3f8 driver_probe_device+0x64/0x130 device_driver_attach+0x6c/0x78 __driver_attach+0xbc/0x158 bus_for_each_dev+0x5c/0x98 driver_attach+0x20/0x28 bus_add_driver+0x158/0x220 driver_register+0x60/0x110 __platform_driver_register+0x44/0x50 fsl_qdma_driver_init+0x18/0x20 do_one_initcall+0x48/0x258 kernel_init_freeable+0x1a4/0x23c kernel_init+0x10/0xf8 ret_from_fork+0x10/0x18 Added Reference kernel.org https://git.kernel.org/stable/c/3cc5fb824c2125aa3740d905b3e5b378c8a09478 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/9579a21e99fe8dab22a253050ddff28d340d74e1 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/4529c084a320be78ff2c5e64297ae998c6fdf66b [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/474d521da890b3e3585335fb80a6044cb2553d99 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/a69c8bbb946936ac4eb6a6ae1e849435aa8d947d [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/677102a930643c31f1b4c512b041407058bdfef8 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/87a39071e0b639f45e05d296cc0538eef44ec0bd [No types assigned]
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-26788
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-26788
weaknesses.