CVE-2024-56584
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/12/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
io_uring/tctx: work around xa_store() allocation error issue<br />
<br />
syzbot triggered the following WARN_ON:<br />
<br />
WARNING: CPU: 0 PID: 16 at io_uring/tctx.c:51 __io_uring_free+0xfa/0x140 io_uring/tctx.c:51<br />
<br />
which is the<br />
<br />
WARN_ON_ONCE(!xa_empty(&tctx->xa));<br />
<br />
sanity check in __io_uring_free() when a io_uring_task is going through<br />
its final put. The syzbot test case includes injecting memory allocation<br />
failures, and it very much looks like xa_store() can fail one of its<br />
memory allocations and end up with ->head being non-NULL even though no<br />
entries exist in the xarray.<br />
<br />
Until this issue gets sorted out, work around it by attempting to<br />
iterate entries in our xarray, and WARN_ON_ONCE() if one is found.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.1 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.66 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/42882b583095dcf747da6e3af1daeff40e27033e
- https://git.kernel.org/stable/c/7eb75ce7527129d7f1fee6951566af409a37a1c4
- https://git.kernel.org/stable/c/94ad56f61b873ffeebcc620d451eacfbdf9d40f0
- https://git.kernel.org/stable/c/d5b2ddf1f90c7248eff9630b95895c8950f2f36d
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



