CVE-2024-56741 (GCVE-0-2024-56741)

Vulnerability from cvelistv5 – Published: 2024-12-29 11:30 – Updated: 2025-03-03 08:12
VLAI?

This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.

Show details on NVD website

{
  "containers": {
    "cna": {
      "providerMetadata": {
        "dateUpdated": "2025-03-03T08:12:43.495Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "rejectedReasons": [
        {
          "lang": "en",
          "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-56741",
    "datePublished": "2024-12-29T11:30:09.843Z",
    "dateRejected": "2025-03-03T08:12:43.495Z",
    "dateReserved": "2024-12-29T11:26:39.758Z",
    "dateUpdated": "2025-03-03T08:12:43.495Z",
    "state": "REJECTED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.6\", \"versionEndExcluding\": \"5.10.231\", \"matchCriteriaId\": \"C4BFC75B-E0F6-4CC1-BE2F-50FBE9ECC42A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.11\", \"versionEndExcluding\": \"5.15.174\", \"matchCriteriaId\": \"419FD073-1517-4FD5-8158-F94BC68A1E89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.16\", \"versionEndExcluding\": \"6.1.120\", \"matchCriteriaId\": \"09AC6122-E2A4-40FE-9D33-268A1B2EC265\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.2\", \"versionEndExcluding\": \"6.6.64\", \"matchCriteriaId\": \"CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.7\", \"versionEndExcluding\": \"6.11.11\", \"matchCriteriaId\": \"21434379-192D-472F-9B54-D45E3650E893\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.12\", \"versionEndExcluding\": \"6.12.2\", \"matchCriteriaId\": \"D8882B1B-2ABC-4838-AC1D-DBDBB5764776\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\napparmor: test: Fix memory leak for aa_unpack_strdup()\\n\\nThe string allocated by kmemdup() in aa_unpack_strdup() is not\\nfreed and cause following memory leaks, free them to fix it.\\n\\n\\tunreferenced object 0xffffff80c6af8a50 (size 8):\\n\\t  comm \\\"kunit_try_catch\\\", pid 225, jiffies 4294894407\\n\\t  hex dump (first 8 bytes):\\n\\t    74 65 73 74 69 6e 67 00                          testing.\\n\\t  backtrace (crc 5eab668b):\\n\\t    [\u003c0000000001e3714d\u003e] kmemleak_alloc+0x34/0x40\\n\\t    [\u003c000000006e6c7776\u003e] __kmalloc_node_track_caller_noprof+0x300/0x3e0\\n\\t    [\u003c000000006870467c\u003e] kmemdup_noprof+0x34/0x60\\n\\t    [\u003c000000001176bb03\u003e] aa_unpack_strdup+0xd0/0x18c\\n\\t    [\u003c000000008ecde918\u003e] policy_unpack_test_unpack_strdup_with_null_name+0xf8/0x3ec\\n\\t    [\u003c0000000032ef8f77\u003e] kunit_try_run_case+0x13c/0x3ac\\n\\t    [\u003c00000000f3edea23\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\\n\\t    [\u003c00000000adf936cf\u003e] kthread+0x2e8/0x374\\n\\t    [\u003c0000000041bb1628\u003e] ret_from_fork+0x10/0x20\\n\\tunreferenced object 0xffffff80c2a29090 (size 8):\\n\\t  comm \\\"kunit_try_catch\\\", pid 227, jiffies 4294894409\\n\\t  hex dump (first 8 bytes):\\n\\t    74 65 73 74 69 6e 67 00                          testing.\\n\\t  backtrace (crc 5eab668b):\\n\\t    [\u003c0000000001e3714d\u003e] kmemleak_alloc+0x34/0x40\\n\\t    [\u003c000000006e6c7776\u003e] __kmalloc_node_track_caller_noprof+0x300/0x3e0\\n\\t    [\u003c000000006870467c\u003e] kmemdup_noprof+0x34/0x60\\n\\t    [\u003c000000001176bb03\u003e] aa_unpack_strdup+0xd0/0x18c\\n\\t    [\u003c0000000046a45c1a\u003e] policy_unpack_test_unpack_strdup_with_name+0xd0/0x3c4\\n\\t    [\u003c0000000032ef8f77\u003e] kunit_try_run_case+0x13c/0x3ac\\n\\t    [\u003c00000000f3edea23\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\\n\\t    [\u003c00000000adf936cf\u003e] kthread+0x2e8/0x374\\n\\t    [\u003c0000000041bb1628\u003e] ret_from_fork+0x10/0x20\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: apparmor: prueba: Se corrige la p\\u00e9rdida de memoria para aa_unpack_strdup() La cadena asignada por kmemdup() en aa_unpack_strdup() no se libera y provoca las siguientes p\\u00e9rdidas de memoria; lib\\u00e9rela para solucionarlo. objeto sin referencia 0xffffff80c6af8a50 (tama\\u00f1o 8): comm \\\"kunit_try_catch\\\", pid 225, jiffies 4294894407 volcado hexadecimal (primeros 8 bytes): 74 65 73 74 69 6e 67 00 pruebas. seguimiento inverso (crc 5eab668b): [\u0026lt;0000000001e3714d\u0026gt;] kmemleak_alloc+0x34/0x40 [\u0026lt;000000006e6c7776\u0026gt;] __kmalloc_node_track_caller_noprof+0x300/0x3e0 [\u0026lt;000000006870467c\u0026gt;] kmemdup_noprof+0x34/0x60 [\u0026lt;000000001176bb03\u0026gt;] aa_unpack_strdup+0xd0/0x18c [\u0026lt;000000008ecde918\u0026gt;] pol\\u00edtica_unpack_test_unpack_strdup_with_null_name+0xf8/0x3ec [\u0026lt;0000000032ef8f77\u0026gt;] kunit_try_run_case+0x13c/0x3ac [\u0026lt;00000000f3edea23\u0026gt;] kunit_generic_run_threadfn_adapter+0x80/0xec [\u0026lt;00000000adf936cf\u0026gt;] kthread+0x2e8/0x374 [\u0026lt;0000000041bb1628\u0026gt;] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80c2a29090 (tama\\u00f1o 8): comm \\\"kunit_try_catch\\\", pid 227, jiffies 4294894409 volcado hexadecimal (primeros 8 bytes): 74 65 73 74 69 6e 67 00 prueba. seguimiento inverso (crc 5eab668b): [\u0026lt;0000000001e3714d\u0026gt;] kmemleak_alloc+0x34/0x40 [\u0026lt;000000006e6c7776\u0026gt;] __kmalloc_node_track_caller_noprof+0x300/0x3e0 [\u0026lt;000000006870467c\u0026gt;] kmemdup_noprof+0x34/0x60 [\u0026lt;000000001176bb03\u0026gt;] aa_unpack_strdup+0xd0/0x18c [\u0026lt;0000000046a45c1a\u0026gt;] pol\\u00edtica_unpack_test_unpack_strdup_with_name+0xd0/0x3c4 [\u0026lt;0000000032ef8f77\u0026gt;] kunit_try_run_case+0x13c/0x3ac [\u0026lt;00000000f3edea23\u0026gt;] kunit_generic_run_threadfn_adapter+0x80/0xec [\u0026lt;00000000adf936cf\u0026gt;] kthread+0x2e8/0x374 [\u0026lt;0000000041bb1628\u0026gt;] ret_from_fork+0x10/0x20\"}]",
      "id": "CVE-2024-56741",
      "lastModified": "2025-01-07T22:19:45.437",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
      "published": "2024-12-29T12:15:07.477",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/2a9b68f2dc6812bd1b8880b5c00e60203d6f61f6\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/5354599855a9b5568e05ce686119ee3ff8b19bd5\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/59a149e7c38e7b76616c8b333fc6aa5b6fb2293c\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/7290f59231910ccba427d441a6e8b8c6f6112448\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/89265f88701e54dde255ddf862093baeca57548c\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/d62ee5739a66644b0e7f11e657d562458cdcdea3\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}, {\"url\": \"https://git.kernel.org/stable/c/f856246ff6da25c4f8fdd73a9c875e878b085e9f\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"tags\": [\"Patch\"]}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Analyzed",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-401\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-56741\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-12-29T12:15:07.477\",\"lastModified\":\"2025-03-03T09:15:31.623\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}],\"metrics\":{},\"references\":[]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…