Skip to main content

CVE-2024-56560: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-56560cvecve-2024-56560
Published: Fri Dec 27 2024 (12/27/2024, 14:23:05 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: slab: Fix too strict alignment check in create_cache() On m68k, where the minimum alignment of unsigned long is 2 bytes: Kernel panic - not syncing: __kmem_cache_create_args: Failed to create slab 'io_kiocb'. Error -22 CPU: 0 UID: 0 PID: 1 Comm: swapper Not tainted 6.12.0-atari-03776-g7eaa1f99261a #1783 Stack from 0102fe5c: 0102fe5c 00514a2b 00514a2b ffffff00 00000001 0051f5ed 00425e78 00514a2b 0041eb74 ffffffea 00000310 0051f5ed ffffffea ffffffea 00601f60 00000044 0102ff20 000e7a68 0051ab8e 004383b8 0051f5ed ffffffea 000000b8 00000007 01020c00 00000000 000e77f0 0041e5f0 005f67c0 0051f5ed 000000b6 0102fef4 00000310 0102fef4 00000000 00000016 005f676c 0060a34c 00000010 00000004 00000038 0000009a 01000000 000000b8 005f668e 0102e000 00001372 0102ff88 Call Trace: [<00425e78>] dump_stack+0xc/0x10 [<0041eb74>] panic+0xd8/0x26c [<000e7a68>] __kmem_cache_create_args+0x278/0x2e8 [<000e77f0>] __kmem_cache_create_args+0x0/0x2e8 [<0041e5f0>] memset+0x0/0x8c [<005f67c0>] io_uring_init+0x54/0xd2 The minimal alignment of an integral type may differ from its size, hence is not safe to assume that an arbitrary freeptr_t (which is basically an unsigned long) is always aligned to 4 or 8 bytes. As nothing seems to require the additional alignment, it is safe to fix this by relaxing the check to the actual minimum alignment of freeptr_t.

AI-Powered Analysis

AILast updated: 06/28/2025, 11:42:20 UTC

Technical Analysis

CVE-2024-56560 is a vulnerability identified in the Linux kernel related to the slab allocator's create_cache() function. Specifically, the issue arises from an overly strict alignment check on the m68k architecture, where the minimum alignment requirement for an unsigned long integer is 2 bytes. The kernel's slab allocator enforces alignment constraints when creating memory caches, and in this case, the assumption that freeptr_t (essentially an unsigned long) must be aligned to 4 or 8 bytes is incorrect for m68k. This misalignment causes kernel panics during cache creation, as evidenced by the panic message: "Kernel panic - not syncing: __kmem_cache_create_args: Failed to create slab 'io_kiocb'. Error -22". The panic trace shows the failure occurs in __kmem_cache_create_args(), triggered during io_uring initialization. The root cause is that the kernel's alignment check does not account for architectures where the minimal alignment of integral types differs from their size. The fix involves relaxing the alignment check to the actual minimal alignment of freeptr_t, preventing unnecessary panics and ensuring proper cache creation. This vulnerability affects Linux kernel versions containing the specified commit hashes and is architecture-specific, primarily impacting m68k systems. There are no known exploits in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-56560 is generally limited due to the niche nature of the affected architecture (m68k). Most modern European IT infrastructures run on x86_64, ARM, or other architectures rather than m68k. However, organizations that maintain legacy systems, embedded devices, or specialized industrial equipment using m68k Linux kernels could experience critical stability issues, including kernel panics leading to system downtime. Such downtime can disrupt critical operations, especially in industrial control systems, telecommunications, or research environments relying on these architectures. Although no remote code execution or privilege escalation is indicated, the denial of service caused by kernel panics can affect availability and operational continuity. The vulnerability does not appear to compromise confidentiality or integrity directly but poses a risk to system reliability and availability. Since the issue occurs during kernel memory cache creation, it could prevent proper initialization of kernel subsystems like io_uring, potentially impacting I/O performance or functionality on affected systems.

Mitigation Recommendations

European organizations should first identify any systems running Linux kernels on the m68k architecture or other similarly affected platforms. For those systems, applying the official Linux kernel patches that relax the alignment check in create_cache() is essential. Since the vulnerability is fixed by adjusting kernel source code, upgrading to the latest stable kernel version containing the fix is the most effective mitigation. For embedded or legacy devices where kernel upgrades are challenging, organizations should consult device vendors for firmware updates or consider isolating affected devices from critical networks to minimize operational impact. Additionally, monitoring kernel logs for panic messages related to slab cache creation can help detect attempts to trigger this issue. Organizations should also review their use of io_uring and related kernel features on affected architectures to ensure stability. Implementing robust backup and recovery procedures will mitigate downtime risks if kernel panics occur. Finally, maintaining an inventory of hardware architectures in use will aid in proactive vulnerability management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-27T14:03:05.994Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9823c4522896dcbdf24d

Added to database: 5/21/2025, 9:08:51 AM

Last enriched: 6/28/2025, 11:42:20 AM

Last updated: 7/30/2025, 5:10:40 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats