Skip to main content

CVE-2024-56718: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-56718cvecve-2024-56718
Published: Sun Dec 29 2024 (12/29/2024, 08:48:50 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net/smc: protect link down work from execute after lgr freed link down work may be scheduled before lgr freed but execute after lgr freed, which may result in crash. So it is need to hold a reference before shedule link down work, and put the reference after work executed or canceled. The relevant crash call stack as follows: list_del corruption. prev->next should be ffffb638c9c0fe20, but was 0000000000000000 ------------[ cut here ]------------ kernel BUG at lib/list_debug.c:51! invalid opcode: 0000 [#1] SMP NOPTI CPU: 6 PID: 978112 Comm: kworker/6:119 Kdump: loaded Tainted: G #1 Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 2221b89 04/01/2014 Workqueue: events smc_link_down_work [smc] RIP: 0010:__list_del_entry_valid.cold+0x31/0x47 RSP: 0018:ffffb638c9c0fdd8 EFLAGS: 00010086 RAX: 0000000000000054 RBX: ffff942fb75e5128 RCX: 0000000000000000 RDX: ffff943520930aa0 RSI: ffff94352091fc80 RDI: ffff94352091fc80 RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb638c9c0fc38 R10: ffffb638c9c0fc30 R11: ffffffffa015eb28 R12: 0000000000000002 R13: ffffb638c9c0fe20 R14: 0000000000000001 R15: ffff942f9cd051c0 FS: 0000000000000000(0000) GS:ffff943520900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4f25214000 CR3: 000000025fbae004 CR4: 00000000007706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: rwsem_down_write_slowpath+0x17e/0x470 smc_link_down_work+0x3c/0x60 [smc] process_one_work+0x1ac/0x350 worker_thread+0x49/0x2f0 ? rescuer_thread+0x360/0x360 kthread+0x118/0x140 ? __kthread_bind_mask+0x60/0x60 ret_from_fork+0x1f/0x30

AI-Powered Analysis

AILast updated: 06/28/2025, 07:24:48 UTC

Technical Analysis

CVE-2024-56718 is a vulnerability identified in the Linux kernel, specifically within the SMC (Shared Memory Communications) networking subsystem. The flaw arises due to improper handling of the 'link down' work scheduling relative to the lifecycle of the 'lgr' (logical group) resource. In the vulnerable code path, the 'link down' work may be scheduled before the 'lgr' resource is freed but could execute after the 'lgr' has already been freed. This race condition leads to a use-after-free scenario, causing corruption of kernel linked lists (notably list_del corruption) and ultimately triggering a kernel crash (kernel BUG). The crash is evidenced by an invalid opcode and a corrupted linked list pointer, as detailed in the provided kernel call stack. The root cause is the lack of a proper reference count hold on the 'lgr' resource before scheduling the work, which should be maintained until the work is either executed or canceled. This vulnerability can cause a denial of service (DoS) by crashing the kernel, impacting system availability. The vulnerability affects Linux kernel versions identified by the given commit hashes and was publicly disclosed on December 29, 2024. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability requires no user interaction but involves kernel-level code execution paths, implying exploitation would require local access or a compromised process capable of triggering the vulnerable code path in the SMC networking stack.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with the SMC networking feature enabled. The impact is mainly a denial of service through kernel crashes, which can disrupt critical infrastructure, cloud services, and enterprise environments relying on Linux servers. Organizations using Linux-based cloud instances, especially those in data centers or cloud providers with SMC enabled, may experience unexpected system reboots or downtime, affecting service availability and potentially leading to operational disruption. While no direct data breach or privilege escalation is indicated, repeated crashes could degrade system reliability and increase maintenance overhead. The vulnerability could be exploited by attackers with local access or through compromised workloads, making it relevant for multi-tenant cloud environments and hosting providers prevalent in Europe. Given the kernel-level nature, recovery may require system reboots and kernel patching, impacting uptime and service continuity.

Mitigation Recommendations

To mitigate CVE-2024-56718, European organizations should: 1) Apply the official Linux kernel patches that address the reference counting and scheduling issue in the SMC subsystem as soon as they become available. 2) Temporarily disable the SMC networking feature if it is not required, reducing the attack surface. 3) Monitor kernel logs for signs of list_del corruption or kernel BUG messages related to smc_link_down_work, enabling early detection of exploitation attempts or crashes. 4) Implement strict access controls and isolation for workloads that could trigger this vulnerability, limiting local access to trusted users and processes. 5) For cloud providers and data centers, ensure rapid deployment of kernel updates across all Linux hosts and consider automated patch management to minimize exposure. 6) Maintain robust backup and recovery procedures to quickly restore affected systems in case of crashes. 7) Engage in proactive vulnerability scanning and penetration testing targeting kernel-level vulnerabilities to identify potential exploitation paths.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-12-27T15:00:39.858Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9822c4522896dcbde62c

Added to database: 5/21/2025, 9:08:50 AM

Last enriched: 6/28/2025, 7:24:48 AM

Last updated: 7/31/2025, 11:15:06 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats