CVE-2024-56672: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To walk up, it uses blkcg_parent(blkcg) but it was calling that after blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the following UAF: ================================================================== BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270 Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117 CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022 Workqueue: cgwb_release cgwb_release_workfn Call Trace: <TASK> dump_stack_lvl+0x27/0x80 print_report+0x151/0x710 kasan_report+0xc0/0x100 blkcg_unpin_online+0x15a/0x270 cgwb_release_workfn+0x194/0x480 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 </TASK> ... Freed by task 1944: kasan_save_track+0x2b/0x70 kasan_save_free_info+0x3c/0x50 __kasan_slab_free+0x33/0x50 kfree+0x10c/0x330 css_free_rwork_fn+0xe6/0xb30 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 Note that the UAF is not easy to trigger as the free path is indirected behind a couple RCU grace periods and a work item execution. I could only trigger it with artifical msleep() injected in blkcg_unpin_online(). Fix it by reading the parent pointer before destroying the blkcg's blkg's.
AI Analysis
Technical Summary
CVE-2024-56672 is a high-severity use-after-free (UAF) vulnerability found in the Linux kernel's block control group (blk-cgroup) subsystem, specifically in the function blkcg_unpin_online(). This function is responsible for walking up the blkcg hierarchy to apply an online pin, using blkcg_parent() to traverse parent control groups. The vulnerability arises because blkcg_parent() is called after blkcg_destroy_blkgs(), which frees the blkcg structure. This sequence leads to a use-after-free condition where the kernel attempts to access memory that has already been freed, causing undefined behavior and potential system instability or compromise. The vulnerability was identified through Kernel Address Sanitizer (KASAN) reports showing slab-use-after-free errors during the execution of blkcg_unpin_online(). Exploiting this flaw is non-trivial due to the indirect free path involving Read-Copy-Update (RCU) grace periods and deferred work items, making triggering the bug challenging without artificial delays. However, if exploited, it could allow an attacker with limited privileges (local user with low privileges) to escalate their privileges or cause denial of service by corrupting kernel memory. The fix involves reordering operations to read the parent pointer before destroying the blkcg's block group structures, preventing access to freed memory. This vulnerability is tracked under CWE-416 (Use After Free) and has a CVSS 3.1 base score of 7.8, indicating high severity with impacts on confidentiality, integrity, and availability. The attack vector is local with low complexity and requires privileges but no user interaction.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying heavily on Linux-based infrastructure, including servers, cloud environments, and embedded systems. The ability to exploit a use-after-free in the kernel can lead to privilege escalation, allowing attackers to gain root-level access from a lower-privileged account. This could result in full system compromise, data breaches, or disruption of critical services. Given the widespread use of Linux in enterprise environments across Europe, including government, finance, telecommunications, and manufacturing sectors, the impact could be severe. Additionally, the vulnerability could be leveraged to disrupt availability through kernel crashes or denial of service attacks. Organizations using containerization or cgroup-based resource management are particularly at risk, as the vulnerability resides in the blk-cgroup subsystem. Although exploitation is complex, the high impact on confidentiality, integrity, and availability means that successful exploitation could have serious consequences for data protection compliance under GDPR and operational continuity.
Mitigation Recommendations
European organizations should prioritize applying the official Linux kernel patches that address CVE-2024-56672 as soon as they become available. Until patches are deployed, organizations should: 1) Restrict local user access to trusted personnel only, minimizing the risk of exploitation by unprivileged users. 2) Monitor kernel logs and system behavior for anomalies related to blk-cgroup operations or unexpected kernel crashes that might indicate exploitation attempts. 3) Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page-Table Isolation (KPTI) to reduce exploitation feasibility. 4) Use security modules like SELinux or AppArmor to enforce strict access controls on processes interacting with cgroups. 5) In containerized environments, isolate workloads and limit capabilities to reduce the attack surface. 6) Regularly update and audit Linux kernel versions across all systems to ensure timely application of security patches. 7) Consider deploying intrusion detection systems capable of detecting kernel-level anomalies. These steps go beyond generic advice by focusing on minimizing local attack vectors and monitoring for exploitation signs specific to this kernel subsystem.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Finland
CVE-2024-56672: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online() blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To walk up, it uses blkcg_parent(blkcg) but it was calling that after blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the following UAF: ================================================================== BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270 Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117 CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022 Workqueue: cgwb_release cgwb_release_workfn Call Trace: <TASK> dump_stack_lvl+0x27/0x80 print_report+0x151/0x710 kasan_report+0xc0/0x100 blkcg_unpin_online+0x15a/0x270 cgwb_release_workfn+0x194/0x480 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 </TASK> ... Freed by task 1944: kasan_save_track+0x2b/0x70 kasan_save_free_info+0x3c/0x50 __kasan_slab_free+0x33/0x50 kfree+0x10c/0x330 css_free_rwork_fn+0xe6/0xb30 process_scheduled_works+0x71b/0xe20 worker_thread+0x82a/0xbd0 kthread+0x242/0x2c0 ret_from_fork+0x33/0x70 ret_from_fork_asm+0x1a/0x30 Note that the UAF is not easy to trigger as the free path is indirected behind a couple RCU grace periods and a work item execution. I could only trigger it with artifical msleep() injected in blkcg_unpin_online(). Fix it by reading the parent pointer before destroying the blkcg's blkg's.
AI-Powered Analysis
Technical Analysis
CVE-2024-56672 is a high-severity use-after-free (UAF) vulnerability found in the Linux kernel's block control group (blk-cgroup) subsystem, specifically in the function blkcg_unpin_online(). This function is responsible for walking up the blkcg hierarchy to apply an online pin, using blkcg_parent() to traverse parent control groups. The vulnerability arises because blkcg_parent() is called after blkcg_destroy_blkgs(), which frees the blkcg structure. This sequence leads to a use-after-free condition where the kernel attempts to access memory that has already been freed, causing undefined behavior and potential system instability or compromise. The vulnerability was identified through Kernel Address Sanitizer (KASAN) reports showing slab-use-after-free errors during the execution of blkcg_unpin_online(). Exploiting this flaw is non-trivial due to the indirect free path involving Read-Copy-Update (RCU) grace periods and deferred work items, making triggering the bug challenging without artificial delays. However, if exploited, it could allow an attacker with limited privileges (local user with low privileges) to escalate their privileges or cause denial of service by corrupting kernel memory. The fix involves reordering operations to read the parent pointer before destroying the blkcg's block group structures, preventing access to freed memory. This vulnerability is tracked under CWE-416 (Use After Free) and has a CVSS 3.1 base score of 7.8, indicating high severity with impacts on confidentiality, integrity, and availability. The attack vector is local with low complexity and requires privileges but no user interaction.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying heavily on Linux-based infrastructure, including servers, cloud environments, and embedded systems. The ability to exploit a use-after-free in the kernel can lead to privilege escalation, allowing attackers to gain root-level access from a lower-privileged account. This could result in full system compromise, data breaches, or disruption of critical services. Given the widespread use of Linux in enterprise environments across Europe, including government, finance, telecommunications, and manufacturing sectors, the impact could be severe. Additionally, the vulnerability could be leveraged to disrupt availability through kernel crashes or denial of service attacks. Organizations using containerization or cgroup-based resource management are particularly at risk, as the vulnerability resides in the blk-cgroup subsystem. Although exploitation is complex, the high impact on confidentiality, integrity, and availability means that successful exploitation could have serious consequences for data protection compliance under GDPR and operational continuity.
Mitigation Recommendations
European organizations should prioritize applying the official Linux kernel patches that address CVE-2024-56672 as soon as they become available. Until patches are deployed, organizations should: 1) Restrict local user access to trusted personnel only, minimizing the risk of exploitation by unprivileged users. 2) Monitor kernel logs and system behavior for anomalies related to blk-cgroup operations or unexpected kernel crashes that might indicate exploitation attempts. 3) Employ kernel hardening techniques such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page-Table Isolation (KPTI) to reduce exploitation feasibility. 4) Use security modules like SELinux or AppArmor to enforce strict access controls on processes interacting with cgroups. 5) In containerized environments, isolate workloads and limit capabilities to reduce the attack surface. 6) Regularly update and audit Linux kernel versions across all systems to ensure timely application of security patches. 7) Consider deploying intrusion detection systems capable of detecting kernel-level anomalies. These steps go beyond generic advice by focusing on minimizing local attack vectors and monitoring for exploitation signs specific to this kernel subsystem.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-12-27T15:00:39.845Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9822c4522896dcbde4e8
Added to database: 5/21/2025, 9:08:50 AM
Last enriched: 7/2/2025, 10:12:42 PM
Last updated: 8/15/2025, 3:12:09 AM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.