CVE-2024-56560

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/12/2024
Last modified:
07/10/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> slab: Fix too strict alignment check in create_cache()<br /> <br /> On m68k, where the minimum alignment of unsigned long is 2 bytes:<br /> <br /> Kernel panic - not syncing: __kmem_cache_create_args: Failed to create slab &amp;#39;io_kiocb&amp;#39;. Error -22<br /> CPU: 0 UID: 0 PID: 1 Comm: swapper Not tainted 6.12.0-atari-03776-g7eaa1f99261a #1783<br /> Stack from 0102fe5c:<br /> 0102fe5c 00514a2b 00514a2b ffffff00 00000001 0051f5ed 00425e78 00514a2b<br /> 0041eb74 ffffffea 00000310 0051f5ed ffffffea ffffffea 00601f60 00000044<br /> 0102ff20 000e7a68 0051ab8e 004383b8 0051f5ed ffffffea 000000b8 00000007<br /> 01020c00 00000000 000e77f0 0041e5f0 005f67c0 0051f5ed 000000b6 0102fef4<br /> 00000310 0102fef4 00000000 00000016 005f676c 0060a34c 00000010 00000004<br /> 00000038 0000009a 01000000 000000b8 005f668e 0102e000 00001372 0102ff88<br /> Call Trace: [] dump_stack+0xc/0x10<br /> [] panic+0xd8/0x26c<br /> [] __kmem_cache_create_args+0x278/0x2e8<br /> [] __kmem_cache_create_args+0x0/0x2e8<br /> [] memset+0x0/0x8c<br /> [] io_uring_init+0x54/0xd2<br /> <br /> The minimal alignment of an integral type may differ from its size,<br /> hence is not safe to assume that an arbitrary freeptr_t (which is<br /> basically an unsigned long) is always aligned to 4 or 8 bytes.<br /> <br /> As nothing seems to require the additional alignment, it is safe to fix<br /> this by relaxing the check to the actual minimum alignment of freeptr_t.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.12 (including) 6.12.4 (excluding)