5.5
MEDIUM
CVE-2024-26845
Linux Kernel iSCSI Target Core Dangling Abort Reference Count
Description

In the Linux kernel, the following vulnerability has been resolved: scsi: target: core: Add TMF to tmr_list handling An abort that is responded to by iSCSI itself is added to tmr_list but does not go to target core. A LUN_RESET that goes through tmr_list takes a refcounter on the abort and waits for completion. However, the abort will be never complete because it was not started in target core. Unable to locate ITT: 0x05000000 on CID: 0 Unable to locate RefTaskTag: 0x05000000 on CID: 0. wait_for_tasks: Stopping tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop wait for tasks: tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop ... INFO: task kworker/0:2:49 blocked for more than 491 seconds. task:kworker/0:2 state:D stack: 0 pid: 49 ppid: 2 flags:0x00000800 Workqueue: events target_tmr_work [target_core_mod] Call Trace: __switch_to+0x2c4/0x470 _schedule+0x314/0x1730 schedule+0x64/0x130 schedule_timeout+0x168/0x430 wait_for_completion+0x140/0x270 target_put_cmd_and_wait+0x64/0xb0 [target_core_mod] core_tmr_lun_reset+0x30/0xa0 [target_core_mod] target_tmr_work+0xc8/0x1b0 [target_core_mod] process_one_work+0x2d4/0x5d0 worker_thread+0x78/0x6c0 To fix this, only add abort to tmr_list if it will be handled by target core.

INFO

Published Date :

April 17, 2024, 10:15 a.m.

Last Modified :

April 2, 2025, 1:17 p.m.

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Remotely Exploitable :

No

Impact Score :

3.6

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2024-26845 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
1 Debian debian_linux
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-26845.

URL Resource
https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d Patch
https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf Patch
https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb Patch
https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171 Patch
https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25 Patch
https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d Patch
https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f Patch
https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a Patch
https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d Patch
https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf Patch
https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb Patch
https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171 Patch
https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25 Patch
https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d Patch
https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f Patch
https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Mailing List

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-26845 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2024-26845 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Apr. 02, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    Added CWE NVD-CWE-noinfo
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.80 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.150 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.270 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.7.7 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.19 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.211 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 4.19.308
    Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
    Added Reference Type CVE: https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25 Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f Types: Patch
    Added Reference Type CVE: https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a Types: Patch
    Added Reference Type CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html Types: Mailing List
    Added Reference Type CVE: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html Types: Mailing List
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d
    Added Reference https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf
    Added Reference https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb
    Added Reference https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171
    Added Reference https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25
    Added Reference https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d
    Added Reference https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f
    Added Reference https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a
    Added Reference https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
    Added Reference https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Nov. 05, 2024

    Action Type Old Value New Value
    Removed Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
    Removed Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jun. 27, 2024

    Action Type Old Value New Value
    Added Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html [No types assigned]
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Jun. 25, 2024

    Action Type Old Value New Value
    Added Reference kernel.org https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html [No types assigned]
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 29, 2024

    Action Type Old Value New Value
  • CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Apr. 17, 2024

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: scsi: target: core: Add TMF to tmr_list handling An abort that is responded to by iSCSI itself is added to tmr_list but does not go to target core. A LUN_RESET that goes through tmr_list takes a refcounter on the abort and waits for completion. However, the abort will be never complete because it was not started in target core. Unable to locate ITT: 0x05000000 on CID: 0 Unable to locate RefTaskTag: 0x05000000 on CID: 0. wait_for_tasks: Stopping tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop wait for tasks: tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop ... INFO: task kworker/0:2:49 blocked for more than 491 seconds. task:kworker/0:2 state:D stack: 0 pid: 49 ppid: 2 flags:0x00000800 Workqueue: events target_tmr_work [target_core_mod] Call Trace: __switch_to+0x2c4/0x470 _schedule+0x314/0x1730 schedule+0x64/0x130 schedule_timeout+0x168/0x430 wait_for_completion+0x140/0x270 target_put_cmd_and_wait+0x64/0xb0 [target_core_mod] core_tmr_lun_reset+0x30/0xa0 [target_core_mod] target_tmr_work+0xc8/0x1b0 [target_core_mod] process_one_work+0x2d4/0x5d0 worker_thread+0x78/0x6c0 To fix this, only add abort to tmr_list if it will be handled by target core.
    Added Reference kernel.org https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25 [No types assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-26845 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-26845 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability