cve-2024-56560
Vulnerability from cvelistv5
Published
2024-12-27 14:23
Modified
2025-01-20 06:23
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: slab: Fix too strict alignment check in create_cache() On m68k, where the minimum alignment of unsigned long is 2 bytes: Kernel panic - not syncing: __kmem_cache_create_args: Failed to create slab 'io_kiocb'. Error -22 CPU: 0 UID: 0 PID: 1 Comm: swapper Not tainted 6.12.0-atari-03776-g7eaa1f99261a #1783 Stack from 0102fe5c: 0102fe5c 00514a2b 00514a2b ffffff00 00000001 0051f5ed 00425e78 00514a2b 0041eb74 ffffffea 00000310 0051f5ed ffffffea ffffffea 00601f60 00000044 0102ff20 000e7a68 0051ab8e 004383b8 0051f5ed ffffffea 000000b8 00000007 01020c00 00000000 000e77f0 0041e5f0 005f67c0 0051f5ed 000000b6 0102fef4 00000310 0102fef4 00000000 00000016 005f676c 0060a34c 00000010 00000004 00000038 0000009a 01000000 000000b8 005f668e 0102e000 00001372 0102ff88 Call Trace: [<00425e78>] dump_stack+0xc/0x10 [<0041eb74>] panic+0xd8/0x26c [<000e7a68>] __kmem_cache_create_args+0x278/0x2e8 [<000e77f0>] __kmem_cache_create_args+0x0/0x2e8 [<0041e5f0>] memset+0x0/0x8c [<005f67c0>] io_uring_init+0x54/0xd2 The minimal alignment of an integral type may differ from its size, hence is not safe to assume that an arbitrary freeptr_t (which is basically an unsigned long) is always aligned to 4 or 8 bytes. As nothing seems to require the additional alignment, it is safe to fix this by relaxing the check to the actual minimum alignment of freeptr_t.
Impacted products
Vendor Product Version
Linux Linux Version: d345bd2e9834e2da505977e154a1c179c793b7b2
Version: d345bd2e9834e2da505977e154a1c179c793b7b2
Create a notification for this product.
   Linux Linux Version: 6.12
Create a notification for this product.
Show details on NVD website


{
   containers: {
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "mm/slab_common.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "8b5aea5e5186733fa4e5aa4293b0a65a933f1a16",
                     status: "affected",
                     version: "d345bd2e9834e2da505977e154a1c179c793b7b2",
                     versionType: "git",
                  },
                  {
                     lessThan: "9008fe8fad8255edfdbecea32d7eb0485d939d0d",
                     status: "affected",
                     version: "d345bd2e9834e2da505977e154a1c179c793b7b2",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "mm/slab_common.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "6.12",
                  },
                  {
                     lessThan: "6.12",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.12.*",
                     status: "unaffected",
                     version: "6.12.4",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.13",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nslab: Fix too strict alignment check in create_cache()\n\nOn m68k, where the minimum alignment of unsigned long is 2 bytes:\n\n    Kernel panic - not syncing: __kmem_cache_create_args: Failed to create slab 'io_kiocb'. Error -22\n    CPU: 0 UID: 0 PID: 1 Comm: swapper Not tainted 6.12.0-atari-03776-g7eaa1f99261a #1783\n    Stack from 0102fe5c:\n\t    0102fe5c 00514a2b 00514a2b ffffff00 00000001 0051f5ed 00425e78 00514a2b\n\t    0041eb74 ffffffea 00000310 0051f5ed ffffffea ffffffea 00601f60 00000044\n\t    0102ff20 000e7a68 0051ab8e 004383b8 0051f5ed ffffffea 000000b8 00000007\n\t    01020c00 00000000 000e77f0 0041e5f0 005f67c0 0051f5ed 000000b6 0102fef4\n\t    00000310 0102fef4 00000000 00000016 005f676c 0060a34c 00000010 00000004\n\t    00000038 0000009a 01000000 000000b8 005f668e 0102e000 00001372 0102ff88\n    Call Trace: [<00425e78>] dump_stack+0xc/0x10\n     [<0041eb74>] panic+0xd8/0x26c\n     [<000e7a68>] __kmem_cache_create_args+0x278/0x2e8\n     [<000e77f0>] __kmem_cache_create_args+0x0/0x2e8\n     [<0041e5f0>] memset+0x0/0x8c\n     [<005f67c0>] io_uring_init+0x54/0xd2\n\nThe minimal alignment of an integral type may differ from its size,\nhence is not safe to assume that an arbitrary freeptr_t (which is\nbasically an unsigned long) is always aligned to 4 or 8 bytes.\n\nAs nothing seems to require the additional alignment, it is safe to fix\nthis by relaxing the check to the actual minimum alignment of freeptr_t.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-01-20T06:23:05.555Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/8b5aea5e5186733fa4e5aa4293b0a65a933f1a16",
            },
            {
               url: "https://git.kernel.org/stable/c/9008fe8fad8255edfdbecea32d7eb0485d939d0d",
            },
         ],
         title: "slab: Fix too strict alignment check in create_cache()",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-56560",
      datePublished: "2024-12-27T14:23:05.490Z",
      dateReserved: "2024-12-27T14:03:05.994Z",
      dateUpdated: "2025-01-20T06:23:05.555Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-56560\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-12-27T15:15:14.873\",\"lastModified\":\"2024-12-27T15:15:14.873\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nslab: Fix too strict alignment check in create_cache()\\n\\nOn m68k, where the minimum alignment of unsigned long is 2 bytes:\\n\\n    Kernel panic - not syncing: __kmem_cache_create_args: Failed to create slab 'io_kiocb'. Error -22\\n    CPU: 0 UID: 0 PID: 1 Comm: swapper Not tainted 6.12.0-atari-03776-g7eaa1f99261a #1783\\n    Stack from 0102fe5c:\\n\\t    0102fe5c 00514a2b 00514a2b ffffff00 00000001 0051f5ed 00425e78 00514a2b\\n\\t    0041eb74 ffffffea 00000310 0051f5ed ffffffea ffffffea 00601f60 00000044\\n\\t    0102ff20 000e7a68 0051ab8e 004383b8 0051f5ed ffffffea 000000b8 00000007\\n\\t    01020c00 00000000 000e77f0 0041e5f0 005f67c0 0051f5ed 000000b6 0102fef4\\n\\t    00000310 0102fef4 00000000 00000016 005f676c 0060a34c 00000010 00000004\\n\\t    00000038 0000009a 01000000 000000b8 005f668e 0102e000 00001372 0102ff88\\n    Call Trace: [<00425e78>] dump_stack+0xc/0x10\\n     [<0041eb74>] panic+0xd8/0x26c\\n     [<000e7a68>] __kmem_cache_create_args+0x278/0x2e8\\n     [<000e77f0>] __kmem_cache_create_args+0x0/0x2e8\\n     [<0041e5f0>] memset+0x0/0x8c\\n     [<005f67c0>] io_uring_init+0x54/0xd2\\n\\nThe minimal alignment of an integral type may differ from its size,\\nhence is not safe to assume that an arbitrary freeptr_t (which is\\nbasically an unsigned long) is always aligned to 4 or 8 bytes.\\n\\nAs nothing seems to require the additional alignment, it is safe to fix\\nthis by relaxing the check to the actual minimum alignment of freeptr_t.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/8b5aea5e5186733fa4e5aa4293b0a65a933f1a16\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9008fe8fad8255edfdbecea32d7eb0485d939d0d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.