CVE-2024-26838: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix KASAN issue with tasklet KASAN testing revealed the following issue assocated with freeing an IRQ. [50006.466686] Call Trace: [50006.466691] <IRQ> [50006.489538] dump_stack+0x5c/0x80 [50006.493475] print_address_description.constprop.6+0x1a/0x150 [50006.499872] ? irdma_sc_process_ceq+0x483/0x790 [irdma] [50006.505742] ? irdma_sc_process_ceq+0x483/0x790 [irdma] [50006.511644] kasan_report.cold.11+0x7f/0x118 [50006.516572] ? irdma_sc_process_ceq+0x483/0x790 [irdma] [50006.522473] irdma_sc_process_ceq+0x483/0x790 [irdma] [50006.528232] irdma_process_ceq+0xb2/0x400 [irdma] [50006.533601] ? irdma_hw_flush_wqes_callback+0x370/0x370 [irdma] [50006.540298] irdma_ceq_dpc+0x44/0x100 [irdma] [50006.545306] tasklet_action_common.isra.14+0x148/0x2c0 [50006.551096] __do_softirq+0x1d0/0xaf8 [50006.555396] irq_exit_rcu+0x219/0x260 [50006.559670] irq_exit+0xa/0x20 [50006.563320] smp_apic_timer_interrupt+0x1bf/0x690 [50006.568645] apic_timer_interrupt+0xf/0x20 [50006.573341] </IRQ> The issue is that a tasklet could be pending on another core racing the delete of the irq. Fix by insuring any scheduled tasklet is killed after deleting the irq.
AI Analysis
Technical Summary
CVE-2024-26838 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem, specifically within the iRDMA (Internet RDMA) driver component. The issue was discovered through Kernel Address Sanitizer (KASAN) testing, which revealed a race condition related to the freeing of an IRQ (Interrupt Request). The vulnerability arises because a tasklet—a lightweight, deferrable kernel function scheduled to run later—could remain pending on another CPU core while the associated IRQ is being deleted. This race condition can lead to use-after-free scenarios or other memory corruption issues, as the tasklet might attempt to access resources that have already been freed or invalidated. The kernel stack trace provided shows the sequence of function calls leading to the problem, including the handling of the completion event queue (CEQ) in the iRDMA driver and the subsequent tasklet execution. The fix implemented ensures that any scheduled tasklet is explicitly killed after the IRQ is deleted, preventing the race condition and eliminating the potential for memory corruption. This vulnerability affects Linux kernel versions identified by the commit hash 44d9e52977a1b90b0db1c7f8b197c218e9226520 and possibly others in the same code lineage. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet. However, the vulnerability is significant due to its potential to cause kernel instability or crashes, which could be leveraged for denial of service or potentially privilege escalation if combined with other vulnerabilities.
Potential Impact
For European organizations, the impact of CVE-2024-26838 primarily concerns systems running Linux kernels with the affected iRDMA driver, which is typically used in environments requiring high-performance RDMA networking, such as data centers, HPC (High Performance Computing) clusters, and cloud infrastructure providers. The vulnerability could lead to kernel crashes or instability, resulting in denial of service conditions that disrupt critical services. In environments where RDMA is used for low-latency, high-throughput networking—such as financial trading platforms, research institutions, and telecommunications—such disruptions could have significant operational and financial consequences. Although no direct evidence suggests remote exploitation or privilege escalation, the memory corruption risk inherent in the race condition could be exploited in complex attack chains. European organizations with sensitive or critical infrastructure relying on Linux-based RDMA implementations should consider this vulnerability a risk to system availability and integrity. Additionally, the lack of known exploits currently reduces immediate threat levels but does not eliminate the need for prompt remediation given the kernel-level nature of the flaw.
Mitigation Recommendations
To mitigate CVE-2024-26838, European organizations should: 1) Apply the official Linux kernel patches that address this vulnerability as soon as they become available from trusted sources such as the Linux kernel mailing list or their Linux distribution vendors. 2) For environments using custom or long-term support kernels, backport the fix ensuring that the tasklet cancellation after IRQ deletion is implemented correctly. 3) Conduct thorough testing in staging environments to verify stability post-patch, especially in systems heavily utilizing RDMA networking. 4) Monitor kernel logs for any unusual IRQ or tasklet-related errors that might indicate attempts to trigger this race condition. 5) Limit access to systems running vulnerable kernels to trusted administrators and restrict network exposure of RDMA interfaces to reduce the attack surface. 6) Employ defense-in-depth strategies such as kernel lockdown features and mandatory access controls (e.g., SELinux, AppArmor) to reduce the impact of potential exploitation. 7) Maintain up-to-date incident response plans that include procedures for kernel-level vulnerabilities and potential denial of service scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2024-26838: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix KASAN issue with tasklet KASAN testing revealed the following issue assocated with freeing an IRQ. [50006.466686] Call Trace: [50006.466691] <IRQ> [50006.489538] dump_stack+0x5c/0x80 [50006.493475] print_address_description.constprop.6+0x1a/0x150 [50006.499872] ? irdma_sc_process_ceq+0x483/0x790 [irdma] [50006.505742] ? irdma_sc_process_ceq+0x483/0x790 [irdma] [50006.511644] kasan_report.cold.11+0x7f/0x118 [50006.516572] ? irdma_sc_process_ceq+0x483/0x790 [irdma] [50006.522473] irdma_sc_process_ceq+0x483/0x790 [irdma] [50006.528232] irdma_process_ceq+0xb2/0x400 [irdma] [50006.533601] ? irdma_hw_flush_wqes_callback+0x370/0x370 [irdma] [50006.540298] irdma_ceq_dpc+0x44/0x100 [irdma] [50006.545306] tasklet_action_common.isra.14+0x148/0x2c0 [50006.551096] __do_softirq+0x1d0/0xaf8 [50006.555396] irq_exit_rcu+0x219/0x260 [50006.559670] irq_exit+0xa/0x20 [50006.563320] smp_apic_timer_interrupt+0x1bf/0x690 [50006.568645] apic_timer_interrupt+0xf/0x20 [50006.573341] </IRQ> The issue is that a tasklet could be pending on another core racing the delete of the irq. Fix by insuring any scheduled tasklet is killed after deleting the irq.
AI-Powered Analysis
Technical Analysis
CVE-2024-26838 is a vulnerability identified in the Linux kernel's RDMA (Remote Direct Memory Access) subsystem, specifically within the iRDMA (Internet RDMA) driver component. The issue was discovered through Kernel Address Sanitizer (KASAN) testing, which revealed a race condition related to the freeing of an IRQ (Interrupt Request). The vulnerability arises because a tasklet—a lightweight, deferrable kernel function scheduled to run later—could remain pending on another CPU core while the associated IRQ is being deleted. This race condition can lead to use-after-free scenarios or other memory corruption issues, as the tasklet might attempt to access resources that have already been freed or invalidated. The kernel stack trace provided shows the sequence of function calls leading to the problem, including the handling of the completion event queue (CEQ) in the iRDMA driver and the subsequent tasklet execution. The fix implemented ensures that any scheduled tasklet is explicitly killed after the IRQ is deleted, preventing the race condition and eliminating the potential for memory corruption. This vulnerability affects Linux kernel versions identified by the commit hash 44d9e52977a1b90b0db1c7f8b197c218e9226520 and possibly others in the same code lineage. No known exploits are reported in the wild at this time, and no CVSS score has been assigned yet. However, the vulnerability is significant due to its potential to cause kernel instability or crashes, which could be leveraged for denial of service or potentially privilege escalation if combined with other vulnerabilities.
Potential Impact
For European organizations, the impact of CVE-2024-26838 primarily concerns systems running Linux kernels with the affected iRDMA driver, which is typically used in environments requiring high-performance RDMA networking, such as data centers, HPC (High Performance Computing) clusters, and cloud infrastructure providers. The vulnerability could lead to kernel crashes or instability, resulting in denial of service conditions that disrupt critical services. In environments where RDMA is used for low-latency, high-throughput networking—such as financial trading platforms, research institutions, and telecommunications—such disruptions could have significant operational and financial consequences. Although no direct evidence suggests remote exploitation or privilege escalation, the memory corruption risk inherent in the race condition could be exploited in complex attack chains. European organizations with sensitive or critical infrastructure relying on Linux-based RDMA implementations should consider this vulnerability a risk to system availability and integrity. Additionally, the lack of known exploits currently reduces immediate threat levels but does not eliminate the need for prompt remediation given the kernel-level nature of the flaw.
Mitigation Recommendations
To mitigate CVE-2024-26838, European organizations should: 1) Apply the official Linux kernel patches that address this vulnerability as soon as they become available from trusted sources such as the Linux kernel mailing list or their Linux distribution vendors. 2) For environments using custom or long-term support kernels, backport the fix ensuring that the tasklet cancellation after IRQ deletion is implemented correctly. 3) Conduct thorough testing in staging environments to verify stability post-patch, especially in systems heavily utilizing RDMA networking. 4) Monitor kernel logs for any unusual IRQ or tasklet-related errors that might indicate attempts to trigger this race condition. 5) Limit access to systems running vulnerable kernels to trusted administrators and restrict network exposure of RDMA interfaces to reduce the attack surface. 6) Employ defense-in-depth strategies such as kernel lockdown features and mandatory access controls (e.g., SELinux, AppArmor) to reduce the impact of potential exploitation. 7) Maintain up-to-date incident response plans that include procedures for kernel-level vulnerabilities and potential denial of service scenarios.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-02-19T14:20:24.182Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982bc4522896dcbe3d49
Added to database: 5/21/2025, 9:08:59 AM
Last enriched: 6/29/2025, 7:12:36 PM
Last updated: 8/18/2025, 7:11:54 AM
Views: 12
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.