CVE-2024-26838
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
17/04/2024
Last modified:
02/04/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA/irdma: Fix KASAN issue with tasklet<br />
<br />
KASAN testing revealed the following issue assocated with freeing an IRQ.<br />
<br />
[50006.466686] Call Trace:<br />
[50006.466691] <br />
[50006.489538] dump_stack+0x5c/0x80<br />
[50006.493475] print_address_description.constprop.6+0x1a/0x150<br />
[50006.499872] ? irdma_sc_process_ceq+0x483/0x790 [irdma]<br />
[50006.505742] ? irdma_sc_process_ceq+0x483/0x790 [irdma]<br />
[50006.511644] kasan_report.cold.11+0x7f/0x118<br />
[50006.516572] ? irdma_sc_process_ceq+0x483/0x790 [irdma]<br />
[50006.522473] irdma_sc_process_ceq+0x483/0x790 [irdma]<br />
[50006.528232] irdma_process_ceq+0xb2/0x400 [irdma]<br />
[50006.533601] ? irdma_hw_flush_wqes_callback+0x370/0x370 [irdma]<br />
[50006.540298] irdma_ceq_dpc+0x44/0x100 [irdma]<br />
[50006.545306] tasklet_action_common.isra.14+0x148/0x2c0<br />
[50006.551096] __do_softirq+0x1d0/0xaf8<br />
[50006.555396] irq_exit_rcu+0x219/0x260<br />
[50006.559670] irq_exit+0xa/0x20<br />
[50006.563320] smp_apic_timer_interrupt+0x1bf/0x690<br />
[50006.568645] apic_timer_interrupt+0xf/0x20<br />
[50006.573341] <br />
<br />
The issue is that a tasklet could be pending on another core racing<br />
the delete of the irq.<br />
<br />
Fix by insuring any scheduled tasklet is killed after deleting the<br />
irq.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 5.15.150 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.80 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.19 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0ae8ad0013978f7471f22bcf45b027393e87f5dc
- https://git.kernel.org/stable/c/635d79aa477f9912e602feb5498bdd51fb9cb824
- https://git.kernel.org/stable/c/b2e4a5266e3d133b4c7f0e43bf40d13ce14fd1aa
- https://git.kernel.org/stable/c/bd97cea7b18a0a553773af806dfbfac27a7c4acb
- https://git.kernel.org/stable/c/c6f1ca235f68b22b3e691b2ea87ac285e5946848
- https://git.kernel.org/stable/c/0ae8ad0013978f7471f22bcf45b027393e87f5dc
- https://git.kernel.org/stable/c/635d79aa477f9912e602feb5498bdd51fb9cb824
- https://git.kernel.org/stable/c/b2e4a5266e3d133b4c7f0e43bf40d13ce14fd1aa
- https://git.kernel.org/stable/c/bd97cea7b18a0a553773af806dfbfac27a7c4acb
- https://git.kernel.org/stable/c/c6f1ca235f68b22b3e691b2ea87ac285e5946848



