CVE-2024-26838

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-26838
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-26838.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-26838
Downstream
Related
Published
2024-04-17T10:10:04.871Z
Modified
2025-11-27T02:33:40.968540Z
Summary
RDMA/irdma: Fix KASAN issue with tasklet
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix KASAN issue with tasklet

KASAN testing revealed the following issue assocated with freeing an IRQ.

[50006.466686] Call Trace: [50006.466691] <IRQ> [50006.489538] dumpstack+0x5c/0x80 [50006.493475] printaddressdescription.constprop.6+0x1a/0x150 [50006.499872] ? irdmascprocessceq+0x483/0x790 [irdma] [50006.505742] ? irdmascprocessceq+0x483/0x790 [irdma] [50006.511644] kasanreport.cold.11+0x7f/0x118 [50006.516572] ? irdmascprocessceq+0x483/0x790 [irdma] [50006.522473] irdmascprocessceq+0x483/0x790 [irdma] [50006.528232] irdmaprocessceq+0xb2/0x400 [irdma] [50006.533601] ? irdmahwflushwqescallback+0x370/0x370 [irdma] [50006.540298] irdmaceqdpc+0x44/0x100 [irdma] [50006.545306] taskletactioncommon.isra.14+0x148/0x2c0 [50006.551096] _dosoftirq+0x1d0/0xaf8 [50006.555396] irqexitrcu+0x219/0x260 [50006.559670] irqexit+0xa/0x20 [50006.563320] smpapictimerinterrupt+0x1bf/0x690 [50006.568645] apictimerinterrupt+0xf/0x20 [50006.573341] </IRQ>

The issue is that a tasklet could be pending on another core racing the delete of the irq.

Fix by insuring any scheduled tasklet is killed after deleting the irq.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/blob/cc431b3424123d84bcd7afd4de150b33f117a8ef/cves/2024/26xxx/CVE-2024-26838.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
44d9e52977a1b90b0db1c7f8b197c218e9226520
Fixed
635d79aa477f9912e602feb5498bdd51fb9cb824
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
44d9e52977a1b90b0db1c7f8b197c218e9226520
Fixed
b2e4a5266e3d133b4c7f0e43bf40d13ce14fd1aa
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
44d9e52977a1b90b0db1c7f8b197c218e9226520
Fixed
c6f1ca235f68b22b3e691b2ea87ac285e5946848
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
44d9e52977a1b90b0db1c7f8b197c218e9226520
Fixed
0ae8ad0013978f7471f22bcf45b027393e87f5dc
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
44d9e52977a1b90b0db1c7f8b197c218e9226520
Fixed
bd97cea7b18a0a553773af806dfbfac27a7c4acb

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
5.15.150
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.80
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.19
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.7.7