cve-2024-56672
Vulnerability from cvelistv5
Published
2024-12-27 15:06
Modified
2025-02-10 17:21
Summary
In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To walk up, it uses blkcg_parent(blkcg) but it was calling that after blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the following UAF: ================================================================== BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270 Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117 CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022 Workqueue: cgwb_release cgwb_release_workfn Call Trace: <TASK> dump_stack_lvl+0x27/0x80 print_report+0x151/0x710 kasan_report+0xc0/0x100 blkcg_unpin_online+0x15a/0x270 cgwb_release_workfn+0x194/0x480 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 </TASK> ... Freed by task 1944: kasan_save_track+0x2b/0x70 kasan_save_free_info+0x3c/0x50 __kasan_slab_free+0x33/0x50 kfree+0x10c/0x330 css_free_rwork_fn+0xe6/0xb30 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 Note that the UAF is not easy to trigger as the free path is indirected behind a couple RCU grace periods and a work item execution. I could only trigger it with artifical msleep() injected in blkcg_unpin_online(). Fix it by reading the parent pointer before destroying the blkcg's blkg's.
Impacted products
Vendor Product Version
Linux Linux Version: 4308a434e5e08c78676aa66bc626ef78cbef0883
Version: 4308a434e5e08c78676aa66bc626ef78cbef0883
Version: 4308a434e5e08c78676aa66bc626ef78cbef0883
Version: 4308a434e5e08c78676aa66bc626ef78cbef0883
Version: 4308a434e5e08c78676aa66bc626ef78cbef0883
Version: 4308a434e5e08c78676aa66bc626ef78cbef0883
Create a notification for this product.
   Linux Linux Version: 5.7
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  cvssV3_1: {
                     attackComplexity: "LOW",
                     attackVector: "LOCAL",
                     availabilityImpact: "HIGH",
                     baseScore: 7.8,
                     baseSeverity: "HIGH",
                     confidentialityImpact: "HIGH",
                     integrityImpact: "HIGH",
                     privilegesRequired: "LOW",
                     scope: "UNCHANGED",
                     userInteraction: "NONE",
                     vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                     version: "3.1",
                  },
               },
               {
                  other: {
                     content: {
                        id: "CVE-2024-56672",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-10T17:12:31.915249Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-416",
                        description: "CWE-416 Use After Free",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-10T17:21:07.331Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "block/blk-cgroup.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "83f5a87ee8caa76a917f59912a74d6811f773c67",
                     status: "affected",
                     version: "4308a434e5e08c78676aa66bc626ef78cbef0883",
                     versionType: "git",
                  },
                  {
                     lessThan: "8a07350fe070017a887433f4d6909433955be5f1",
                     status: "affected",
                     version: "4308a434e5e08c78676aa66bc626ef78cbef0883",
                     versionType: "git",
                  },
                  {
                     lessThan: "64afc6fe24c9896c0153e5a199bcea241ecb0d5c",
                     status: "affected",
                     version: "4308a434e5e08c78676aa66bc626ef78cbef0883",
                     versionType: "git",
                  },
                  {
                     lessThan: "5baa28569c924d9a90d036c2aaab79f791fedaf8",
                     status: "affected",
                     version: "4308a434e5e08c78676aa66bc626ef78cbef0883",
                     versionType: "git",
                  },
                  {
                     lessThan: "29d1e06560f0f6179062ac638b4064deb637d1ad",
                     status: "affected",
                     version: "4308a434e5e08c78676aa66bc626ef78cbef0883",
                     versionType: "git",
                  },
                  {
                     lessThan: "86e6ca55b83c575ab0f2e105cf08f98e58d3d7af",
                     status: "affected",
                     version: "4308a434e5e08c78676aa66bc626ef78cbef0883",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "block/blk-cgroup.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "5.7",
                  },
                  {
                     lessThan: "5.7",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.10.*",
                     status: "unaffected",
                     version: "5.10.234",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "5.15.*",
                     status: "unaffected",
                     version: "5.15.177",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.1.*",
                     status: "unaffected",
                     version: "6.1.121",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.67",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.12.*",
                     status: "unaffected",
                     version: "6.12.6",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.13",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: Fix UAF in blkcg_unpin_online()\n\nblkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To\nwalk up, it uses blkcg_parent(blkcg) but it was calling that after\nblkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the\nfollowing UAF:\n\n  ==================================================================\n  BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270\n  Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117\n\n  CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022\n  Workqueue: cgwb_release cgwb_release_workfn\n  Call Trace:\n   <TASK>\n   dump_stack_lvl+0x27/0x80\n   print_report+0x151/0x710\n   kasan_report+0xc0/0x100\n   blkcg_unpin_online+0x15a/0x270\n   cgwb_release_workfn+0x194/0x480\n   process_scheduled_works+0x71b/0xe20\n   worker_thread+0x82a/0xbd0\n   kthread+0x242/0x2c0\n   ret_from_fork+0x33/0x70\n   ret_from_fork_asm+0x1a/0x30\n   </TASK>\n  ...\n  Freed by task 1944:\n   kasan_save_track+0x2b/0x70\n   kasan_save_free_info+0x3c/0x50\n   __kasan_slab_free+0x33/0x50\n   kfree+0x10c/0x330\n   css_free_rwork_fn+0xe6/0xb30\n   process_scheduled_works+0x71b/0xe20\n   worker_thread+0x82a/0xbd0\n   kthread+0x242/0x2c0\n   ret_from_fork+0x33/0x70\n   ret_from_fork_asm+0x1a/0x30\n\nNote that the UAF is not easy to trigger as the free path is indirected\nbehind a couple RCU grace periods and a work item execution. I could only\ntrigger it with artifical msleep() injected in blkcg_unpin_online().\n\nFix it by reading the parent pointer before destroying the blkcg's blkg's.",
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-02-02T10:15:14.888Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/83f5a87ee8caa76a917f59912a74d6811f773c67",
            },
            {
               url: "https://git.kernel.org/stable/c/8a07350fe070017a887433f4d6909433955be5f1",
            },
            {
               url: "https://git.kernel.org/stable/c/64afc6fe24c9896c0153e5a199bcea241ecb0d5c",
            },
            {
               url: "https://git.kernel.org/stable/c/5baa28569c924d9a90d036c2aaab79f791fedaf8",
            },
            {
               url: "https://git.kernel.org/stable/c/29d1e06560f0f6179062ac638b4064deb637d1ad",
            },
            {
               url: "https://git.kernel.org/stable/c/86e6ca55b83c575ab0f2e105cf08f98e58d3d7af",
            },
         ],
         title: "blk-cgroup: Fix UAF in blkcg_unpin_online()",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2024-56672",
      datePublished: "2024-12-27T15:06:33.358Z",
      dateReserved: "2024-12-27T15:00:39.845Z",
      dateUpdated: "2025-02-10T17:21:07.331Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-56672\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-12-27T15:15:27.107\",\"lastModified\":\"2025-02-10T18:15:31.643\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nblk-cgroup: Fix UAF in blkcg_unpin_online()\\n\\nblkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To\\nwalk up, it uses blkcg_parent(blkcg) but it was calling that after\\nblkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the\\nfollowing UAF:\\n\\n  ==================================================================\\n  BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270\\n  Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117\\n\\n  CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48\\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022\\n  Workqueue: cgwb_release cgwb_release_workfn\\n  Call Trace:\\n   <TASK>\\n   dump_stack_lvl+0x27/0x80\\n   print_report+0x151/0x710\\n   kasan_report+0xc0/0x100\\n   blkcg_unpin_online+0x15a/0x270\\n   cgwb_release_workfn+0x194/0x480\\n   process_scheduled_works+0x71b/0xe20\\n   worker_thread+0x82a/0xbd0\\n   kthread+0x242/0x2c0\\n   ret_from_fork+0x33/0x70\\n   ret_from_fork_asm+0x1a/0x30\\n   </TASK>\\n  ...\\n  Freed by task 1944:\\n   kasan_save_track+0x2b/0x70\\n   kasan_save_free_info+0x3c/0x50\\n   __kasan_slab_free+0x33/0x50\\n   kfree+0x10c/0x330\\n   css_free_rwork_fn+0xe6/0xb30\\n   process_scheduled_works+0x71b/0xe20\\n   worker_thread+0x82a/0xbd0\\n   kthread+0x242/0x2c0\\n   ret_from_fork+0x33/0x70\\n   ret_from_fork_asm+0x1a/0x30\\n\\nNote that the UAF is not easy to trigger as the free path is indirected\\nbehind a couple RCU grace periods and a work item execution. I could only\\ntrigger it with artifical msleep() injected in blkcg_unpin_online().\\n\\nFix it by reading the parent pointer before destroying the blkcg's blkg's.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: blk-cgroup: corrige UAF en blkcg_unpin_online() blkcg_unpin_online() sube por la jerarquía blkcg y coloca el pin en línea. Para subir, usa blkcg_parent(blkcg) pero lo estaba llamando después de blkcg_destroy_blkgs(blkcg) que podría liberar el blkcg, lo que lleva al siguiente UAF: ====================================================================== ERROR: KASAN: slab-use-after-free en blkcg_unpin_online+0x15a/0x270 Lectura de tamaño 8 en la dirección ffff8881057678c0 por la tarea kworker/9:1/117 CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 No contaminado 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48 Nombre del hardware: PC estándar QEMU (i440FX + PIIX, 1996), BIOS desconocido 02/02/2022 Cola de trabajo: cgwb_release cgwb_release_workfn Seguimiento de llamadas:  dump_stack_lvl+0x27/0x80 print_report+0x151/0x710 kasan_report+0xc0/0x100 blkcg_unpin_online+0x15a/0x270 cgwb_release_workfn+0x194/0x480 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30  ... Liberado por la tarea 1944: kasan_save_track+0x2b/0x70 kasan_save_free_info+0x3c/0x50 __kasan_slab_free+0x33/0x50 kfree+0x10c/0x330 css_free_rwork_fn+0xe6/0xb30 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 Tenga en cuenta que el UAF no es fácil de activar ya que la ruta libre es Se produjo un error indirecto detrás de un par de períodos de gracia de RCU y una ejecución de elemento de trabajo. Solo pude activarlo con msleep() artificial inyectado en blkcg_unpin_online(). Solucione el problema leyendo el puntero principal antes de destruir los blkg de blkcg.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.7\",\"versionEndExcluding\":\"6.1.121\",\"matchCriteriaId\":\"DA13D8C8-4561-4F7A-8047-DAD1CB2DABD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.67\",\"matchCriteriaId\":\"BF4F2CD1-2CA6-4D6B-9B0C-57C3C4D6544A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.12.6\",\"matchCriteriaId\":\"0CB1A9BB-F95E-43DD-A2FD-147912FD91E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"62567B3C-6CEE-46D0-BC2E-B3717FBF7D13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A073481-106D-4B15-B4C7-FB0213B8E1D4\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/29d1e06560f0f6179062ac638b4064deb637d1ad\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5baa28569c924d9a90d036c2aaab79f791fedaf8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/64afc6fe24c9896c0153e5a199bcea241ecb0d5c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/83f5a87ee8caa76a917f59912a74d6811f773c67\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/86e6ca55b83c575ab0f2e105cf08f98e58d3d7af\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8a07350fe070017a887433f4d6909433955be5f1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-56672\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-10T17:12:31.915249Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-10T17:12:33.315Z\"}}], \"cna\": {\"title\": \"blk-cgroup: Fix UAF in blkcg_unpin_online()\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4308a434e5e08c78676aa66bc626ef78cbef0883\", \"lessThan\": \"83f5a87ee8caa76a917f59912a74d6811f773c67\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4308a434e5e08c78676aa66bc626ef78cbef0883\", \"lessThan\": \"8a07350fe070017a887433f4d6909433955be5f1\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4308a434e5e08c78676aa66bc626ef78cbef0883\", \"lessThan\": \"64afc6fe24c9896c0153e5a199bcea241ecb0d5c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4308a434e5e08c78676aa66bc626ef78cbef0883\", \"lessThan\": \"5baa28569c924d9a90d036c2aaab79f791fedaf8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4308a434e5e08c78676aa66bc626ef78cbef0883\", \"lessThan\": \"29d1e06560f0f6179062ac638b4064deb637d1ad\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"4308a434e5e08c78676aa66bc626ef78cbef0883\", \"lessThan\": \"86e6ca55b83c575ab0f2e105cf08f98e58d3d7af\", \"versionType\": \"git\"}], \"programFiles\": [\"block/blk-cgroup.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.7\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.7\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.10.234\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.177\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.121\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.67\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.12.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.12.*\"}, {\"status\": \"unaffected\", \"version\": \"6.13\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"block/blk-cgroup.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/83f5a87ee8caa76a917f59912a74d6811f773c67\"}, {\"url\": \"https://git.kernel.org/stable/c/8a07350fe070017a887433f4d6909433955be5f1\"}, {\"url\": \"https://git.kernel.org/stable/c/64afc6fe24c9896c0153e5a199bcea241ecb0d5c\"}, {\"url\": \"https://git.kernel.org/stable/c/5baa28569c924d9a90d036c2aaab79f791fedaf8\"}, {\"url\": \"https://git.kernel.org/stable/c/29d1e06560f0f6179062ac638b4064deb637d1ad\"}, {\"url\": \"https://git.kernel.org/stable/c/86e6ca55b83c575ab0f2e105cf08f98e58d3d7af\"}], \"x_generator\": {\"engine\": \"bippy-5f407fcff5a0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nblk-cgroup: Fix UAF in blkcg_unpin_online()\\n\\nblkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To\\nwalk up, it uses blkcg_parent(blkcg) but it was calling that after\\nblkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the\\nfollowing UAF:\\n\\n  ==================================================================\\n  BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270\\n  Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117\\n\\n  CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48\\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022\\n  Workqueue: cgwb_release cgwb_release_workfn\\n  Call Trace:\\n   <TASK>\\n   dump_stack_lvl+0x27/0x80\\n   print_report+0x151/0x710\\n   kasan_report+0xc0/0x100\\n   blkcg_unpin_online+0x15a/0x270\\n   cgwb_release_workfn+0x194/0x480\\n   process_scheduled_works+0x71b/0xe20\\n   worker_thread+0x82a/0xbd0\\n   kthread+0x242/0x2c0\\n   ret_from_fork+0x33/0x70\\n   ret_from_fork_asm+0x1a/0x30\\n   </TASK>\\n  ...\\n  Freed by task 1944:\\n   kasan_save_track+0x2b/0x70\\n   kasan_save_free_info+0x3c/0x50\\n   __kasan_slab_free+0x33/0x50\\n   kfree+0x10c/0x330\\n   css_free_rwork_fn+0xe6/0xb30\\n   process_scheduled_works+0x71b/0xe20\\n   worker_thread+0x82a/0xbd0\\n   kthread+0x242/0x2c0\\n   ret_from_fork+0x33/0x70\\n   ret_from_fork_asm+0x1a/0x30\\n\\nNote that the UAF is not easy to trigger as the free path is indirected\\nbehind a couple RCU grace periods and a work item execution. I could only\\ntrigger it with artifical msleep() injected in blkcg_unpin_online().\\n\\nFix it by reading the parent pointer before destroying the blkcg's blkg's.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-02-02T10:15:14.888Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-56672\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-10T17:21:07.331Z\", \"dateReserved\": \"2024-12-27T15:00:39.845Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-12-27T15:06:33.358Z\", \"assignerShortName\": \"Linux\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.