CVE-2024-56672
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
27/12/2024
Last modified:
10/02/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
blk-cgroup: Fix UAF in blkcg_unpin_online()<br />
<br />
blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To<br />
walk up, it uses blkcg_parent(blkcg) but it was calling that after<br />
blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the<br />
following UAF:<br />
<br />
==================================================================<br />
BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270<br />
Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117<br />
<br />
CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022<br />
Workqueue: cgwb_release cgwb_release_workfn<br />
Call Trace:<br />
<br />
dump_stack_lvl+0x27/0x80<br />
print_report+0x151/0x710<br />
kasan_report+0xc0/0x100<br />
blkcg_unpin_online+0x15a/0x270<br />
cgwb_release_workfn+0x194/0x480<br />
process_scheduled_works+0x71b/0xe20<br />
worker_thread+0x82a/0xbd0<br />
kthread+0x242/0x2c0<br />
ret_from_fork+0x33/0x70<br />
ret_from_fork_asm+0x1a/0x30<br />
<br />
...<br />
Freed by task 1944:<br />
kasan_save_track+0x2b/0x70<br />
kasan_save_free_info+0x3c/0x50<br />
__kasan_slab_free+0x33/0x50<br />
kfree+0x10c/0x330<br />
css_free_rwork_fn+0xe6/0xb30<br />
process_scheduled_works+0x71b/0xe20<br />
worker_thread+0x82a/0xbd0<br />
kthread+0x242/0x2c0<br />
ret_from_fork+0x33/0x70<br />
ret_from_fork_asm+0x1a/0x30<br />
<br />
Note that the UAF is not easy to trigger as the free path is indirected<br />
behind a couple RCU grace periods and a work item execution. I could only<br />
trigger it with artifical msleep() injected in blkcg_unpin_online().<br />
<br />
Fix it by reading the parent pointer before destroying the blkcg&#39;s blkg&#39;s.
Impact
Base Score 3.x
7.00
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.7 (including) | 6.1.121 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.67 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.6 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/29d1e06560f0f6179062ac638b4064deb637d1ad
- https://git.kernel.org/stable/c/5baa28569c924d9a90d036c2aaab79f791fedaf8
- https://git.kernel.org/stable/c/64afc6fe24c9896c0153e5a199bcea241ecb0d5c
- https://git.kernel.org/stable/c/83f5a87ee8caa76a917f59912a74d6811f773c67
- https://git.kernel.org/stable/c/86e6ca55b83c575ab0f2e105cf08f98e58d3d7af
- https://git.kernel.org/stable/c/8a07350fe070017a887433f4d6909433955be5f1