Executive Summary

Informations
Name CVE-2024-56672 First vendor Publication 2024-12-27
Vendor Cve Last vendor Modification 2025-02-10

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Overall CVSS Score 7
Base Score 7 Environmental Score 7
impact SubScore 5.9 Temporal Score 7
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: Fix UAF in blkcg_unpin_online()

blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To walk up, it uses blkcg_parent(blkcg) but it was calling that after blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the following UAF:

==================================================================
BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270
Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117

CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022
Workqueue: cgwb_release cgwb_release_workfn
Call Trace:

dump_stack_lvl+0x27/0x80
print_report+0x151/0x710
kasan_report+0xc0/0x100
blkcg_unpin_online+0x15a/0x270
cgwb_release_workfn+0x194/0x480
process_scheduled_works+0x71b/0xe20
worker_thread+0x82a/0xbd0
kthread+0x242/0x2c0
ret_from_fork+0x33/0x70
ret_from_fork_asm+0x1a/0x30

...
Freed by task 1944:
kasan_save_track+0x2b/0x70
kasan_save_free_info+0x3c/0x50
__kasan_slab_free+0x33/0x50
kfree+0x10c/0x330
css_free_rwork_fn+0xe6/0xb30
process_scheduled_works+0x71b/0xe20
worker_thread+0x82a/0xbd0
kthread+0x242/0x2c0
ret_from_fork+0x33/0x70
ret_from_fork_asm+0x1a/0x30

Note that the UAF is not easy to trigger as the free path is indirected behind a couple RCU grace periods and a work item execution. I could only trigger it with artifical msleep() injected in blkcg_unpin_online().

Fix it by reading the parent pointer before destroying the blkcg's blkg's.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56672

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-416 Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3703

Sources (Detail)

https://git.kernel.org/stable/c/29d1e06560f0f6179062ac638b4064deb637d1ad
https://git.kernel.org/stable/c/5baa28569c924d9a90d036c2aaab79f791fedaf8
https://git.kernel.org/stable/c/64afc6fe24c9896c0153e5a199bcea241ecb0d5c
https://git.kernel.org/stable/c/83f5a87ee8caa76a917f59912a74d6811f773c67
https://git.kernel.org/stable/c/86e6ca55b83c575ab0f2e105cf08f98e58d3d7af
https://git.kernel.org/stable/c/8a07350fe070017a887433f4d6909433955be5f1
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Date Informations
2025-07-15 02:41:16
  • Multiple Updates
2025-07-14 12:38:33
  • Multiple Updates
2025-06-26 02:38:30
  • Multiple Updates
2025-06-25 12:36:34
  • Multiple Updates
2025-06-24 02:43:08
  • Multiple Updates
2025-05-27 02:48:33
  • Multiple Updates
2025-03-29 03:44:27
  • Multiple Updates
2025-03-28 13:47:43
  • Multiple Updates
2025-03-28 03:22:16
  • Multiple Updates
2025-03-19 03:17:05
  • Multiple Updates
2025-03-18 03:30:04
  • Multiple Updates
2025-03-14 03:17:12
  • Multiple Updates
2025-03-06 14:13:44
  • Multiple Updates
2025-02-22 03:27:16
  • Multiple Updates
2025-02-11 17:20:37
  • Multiple Updates
2025-02-02 17:20:40
  • Multiple Updates
2025-01-23 21:20:36
  • Multiple Updates
2025-01-08 00:20:53
  • Multiple Updates
2025-01-07 03:08:08
  • Multiple Updates
2025-01-07 00:20:36
  • Multiple Updates
2025-01-06 21:20:42
  • Multiple Updates
2024-12-27 21:20:27
  • First insertion