CVE-2024-56781 (GCVE-0-2024-56781)

Vulnerability from cvelistv5 – Published: 2025-01-08 17:51 – Updated: 2026-01-05 11:09
VLAI?

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

Show details on NVD website

{
  "containers": {
    "cna": {
      "providerMetadata": {
        "dateUpdated": "2026-01-05T11:09:53.968Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "rejectedReasons": [
        {
          "lang": "en",
          "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-56781",
    "datePublished": "2025-01-08T17:51:57.856Z",
    "dateRejected": "2026-01-05T11:09:53.968Z",
    "dateReserved": "2024-12-29T11:26:39.768Z",
    "dateUpdated": "2026-01-05T11:09:53.968Z",
    "state": "REJECTED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"5.4.287\", \"matchCriteriaId\": \"DC7D5C80-B677-4131-A399-3366D7F3961C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.5\", \"versionEndExcluding\": \"5.10.231\", \"matchCriteriaId\": \"B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.11\", \"versionEndExcluding\": \"5.15.174\", \"matchCriteriaId\": \"419FD073-1517-4FD5-8158-F94BC68A1E89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.16\", \"versionEndExcluding\": \"6.1.120\", \"matchCriteriaId\": \"09AC6122-E2A4-40FE-9D33-268A1B2EC265\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.2\", \"versionEndExcluding\": \"6.6.66\", \"matchCriteriaId\": \"29A976AD-B9AB-4A95-9F08-7669F8847EB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.7\", \"versionEndExcluding\": \"6.12.5\", \"matchCriteriaId\": \"9501D045-7A94-42CA-8B03-821BE94A65B7\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\npowerpc/prom_init: Fixup missing powermac #size-cells\\n\\nOn some powermacs `escc` nodes are missing `#size-cells` properties,\\nwhich is deprecated and now triggers a warning at boot since commit\\n045b14ca5c36 (\\\"of: WARN on deprecated #address-cells/#size-cells\\nhandling\\\").\\n\\nFor example:\\n\\n  Missing \u0027#size-cells\u0027 in /pci@f2000000/mac-io@c/escc@13000\\n  WARNING: CPU: 0 PID: 0 at drivers/of/base.c:133 of_bus_n_size_cells+0x98/0x108\\n  Hardware name: PowerMac3,1 7400 0xc0209 PowerMac\\n  ...\\n  Call Trace:\\n    of_bus_n_size_cells+0x98/0x108 (unreliable)\\n    of_bus_default_count_cells+0x40/0x60\\n    __of_get_address+0xc8/0x21c\\n    __of_address_to_resource+0x5c/0x228\\n    pmz_init_port+0x5c/0x2ec\\n    pmz_probe.isra.0+0x144/0x1e4\\n    pmz_console_init+0x10/0x48\\n    console_init+0xcc/0x138\\n    start_kernel+0x5c4/0x694\\n\\nAs powermacs boot via prom_init it\u0027s possible to add the missing\\nproperties to the device tree during boot, avoiding the warning. Note\\nthat `escc-legacy` nodes are also missing `#size-cells` properties, but\\nthey are skipped by the macio driver, so leave them alone.\\n\\nDepends-on: 045b14ca5c36 (\\\"of: WARN on deprecated #address-cells/#size-cells handling\\\")\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/prom_init: Reparaci\\u00f3n de #size-cells faltantes en powermac. En algunos nodos `escc` faltan las propiedades `#size-cells`, lo cual est\\u00e1 obsoleto y ahora activa una advertencia en el arranque desde el commit 045b14ca5c36 (\\\"of: WARN on precated #address-cells/#size-cells management\\\"). Por ejemplo: Falta \u0027#size-cells\u0027 en /pci@f2000000/mac-io@c/escc@13000 ADVERTENCIA: CPU: 0 PID: 0 en drivers/of/base.c:133 of_bus_n_size_cells+0x98/0x108 Nombre de hardware: PowerMac3,1 7400 0xc0209 PowerMac ... Seguimiento de llamadas: of_bus_n_size_cells+0x98/0x108 (no confiable) of_bus_default_count_cells+0x40/0x60 __of_get_address+0xc8/0x21c __of_address_to_resource+0x5c/0x228 pmz_init_port+0x5c/0x2ec pmz_probe.isra.0+0x144/0x1e4 pmz_console_init+0x10/0x48 console_init+0xcc/0x138 start_kernel+0x5c4/0x694 Como los powermacs arrancan a trav\\u00e9s de prom_init, es posible agregar las propiedades faltantes al \\u00e1rbol de dispositivos durante el arranque, evitando la advertencia. Tenga en cuenta que a los nodos `escc-legacy` tambi\\u00e9n les faltan las propiedades `#size-cells`, pero el controlador de Macio las omite, as\\u00ed que d\\u00e9jelas como est\\u00e1n. Depende de: 045b14ca5c36 (\\\"of: WARN on deprecated #address-cells/#size-cells management\\\")\"}]",
      "id": "CVE-2024-56781",
      "lastModified": "2025-01-09T21:21:49.207",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
      "published": "2025-01-08T18:15:19.030",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/0b94d838018fb0a824e0cd3149034928c99fb1b7\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/296a109fa77110ba5267fe0e90a26005eecc2726\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/691284c2cd33ffaa0b35ce53b3286b90621e9dc9\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/6d5f0453a2228607333bff0c85238a3cb495d194\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/a79a7e3c03ae2a07f68b5f24d5ed549f9799ec89\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/cf89c9434af122f28a3552e6f9cc5158c33ce50a\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/ee68554d2c03e32077f7b984e5289fdb005036d2\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Analyzed",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-56781\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-01-08T18:15:19.030\",\"lastModified\":\"2026-01-05T11:17:29.617\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}],\"metrics\":{},\"references\":[]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"rejectedReasons\": [{\"lang\": \"en\", \"value\": \"This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2026-01-05T11:09:53.968Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-56781\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"state\": \"REJECTED\", \"assignerShortName\": \"Linux\", \"dateReserved\": \"2024-12-29T11:26:39.768Z\", \"datePublished\": \"2025-01-08T17:51:57.856Z\", \"dateUpdated\": \"2026-01-05T11:09:53.968Z\", \"dateRejected\": \"2026-01-05T11:09:53.968Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…