cve-2024-56741
Vulnerability from cvelistv5
Published
2024-12-29 11:30
Modified
2025-01-20 06:27
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: apparmor: test: Fix memory leak for aa_unpack_strdup() The string allocated by kmemdup() in aa_unpack_strdup() is not freed and cause following memory leaks, free them to fix it. unreferenced object 0xffffff80c6af8a50 (size 8): comm "kunit_try_catch", pid 225, jiffies 4294894407 hex dump (first 8 bytes): 74 65 73 74 69 6e 67 00 testing. backtrace (crc 5eab668b): [<0000000001e3714d>] kmemleak_alloc+0x34/0x40 [<000000006e6c7776>] __kmalloc_node_track_caller_noprof+0x300/0x3e0 [<000000006870467c>] kmemdup_noprof+0x34/0x60 [<000000001176bb03>] aa_unpack_strdup+0xd0/0x18c [<000000008ecde918>] policy_unpack_test_unpack_strdup_with_null_name+0xf8/0x3ec [<0000000032ef8f77>] kunit_try_run_case+0x13c/0x3ac [<00000000f3edea23>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000adf936cf>] kthread+0x2e8/0x374 [<0000000041bb1628>] ret_from_fork+0x10/0x20 unreferenced object 0xffffff80c2a29090 (size 8): comm "kunit_try_catch", pid 227, jiffies 4294894409 hex dump (first 8 bytes): 74 65 73 74 69 6e 67 00 testing. backtrace (crc 5eab668b): [<0000000001e3714d>] kmemleak_alloc+0x34/0x40 [<000000006e6c7776>] __kmalloc_node_track_caller_noprof+0x300/0x3e0 [<000000006870467c>] kmemdup_noprof+0x34/0x60 [<000000001176bb03>] aa_unpack_strdup+0xd0/0x18c [<0000000046a45c1a>] policy_unpack_test_unpack_strdup_with_name+0xd0/0x3c4 [<0000000032ef8f77>] kunit_try_run_case+0x13c/0x3ac [<00000000f3edea23>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000adf936cf>] kthread+0x2e8/0x374 [<0000000041bb1628>] ret_from_fork+0x10/0x20
Impacted products
Vendor Product Version
Linux Linux Version: 4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1
Version: 4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1
Version: 4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1
Version: 4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1
Version: 4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1
Version: 4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1
Version: 4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1
Create a notification for this product.
   Linux Linux Version: 5.6
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "security/apparmor/policy_unpack_test.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "f856246ff6da25c4f8fdd73a9c875e878b085e9f",
              "status": "affected",
              "version": "4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1",
              "versionType": "git"
            },
            {
              "lessThan": "5354599855a9b5568e05ce686119ee3ff8b19bd5",
              "status": "affected",
              "version": "4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1",
              "versionType": "git"
            },
            {
              "lessThan": "89265f88701e54dde255ddf862093baeca57548c",
              "status": "affected",
              "version": "4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1",
              "versionType": "git"
            },
            {
              "lessThan": "2a9b68f2dc6812bd1b8880b5c00e60203d6f61f6",
              "status": "affected",
              "version": "4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1",
              "versionType": "git"
            },
            {
              "lessThan": "59a149e7c38e7b76616c8b333fc6aa5b6fb2293c",
              "status": "affected",
              "version": "4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1",
              "versionType": "git"
            },
            {
              "lessThan": "d62ee5739a66644b0e7f11e657d562458cdcdea3",
              "status": "affected",
              "version": "4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1",
              "versionType": "git"
            },
            {
              "lessThan": "7290f59231910ccba427d441a6e8b8c6f6112448",
              "status": "affected",
              "version": "4d944bcd4e731ab7bfe8d01a7041ea0ebdc090f1",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "security/apparmor/policy_unpack_test.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.6"
            },
            {
              "lessThan": "5.6",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.231",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.174",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.120",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.64",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.11.*",
              "status": "unaffected",
              "version": "6.11.11",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.13",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: test: Fix memory leak for aa_unpack_strdup()\n\nThe string allocated by kmemdup() in aa_unpack_strdup() is not\nfreed and cause following memory leaks, free them to fix it.\n\n\tunreferenced object 0xffffff80c6af8a50 (size 8):\n\t  comm \"kunit_try_catch\", pid 225, jiffies 4294894407\n\t  hex dump (first 8 bytes):\n\t    74 65 73 74 69 6e 67 00                          testing.\n\t  backtrace (crc 5eab668b):\n\t    [\u003c0000000001e3714d\u003e] kmemleak_alloc+0x34/0x40\n\t    [\u003c000000006e6c7776\u003e] __kmalloc_node_track_caller_noprof+0x300/0x3e0\n\t    [\u003c000000006870467c\u003e] kmemdup_noprof+0x34/0x60\n\t    [\u003c000000001176bb03\u003e] aa_unpack_strdup+0xd0/0x18c\n\t    [\u003c000000008ecde918\u003e] policy_unpack_test_unpack_strdup_with_null_name+0xf8/0x3ec\n\t    [\u003c0000000032ef8f77\u003e] kunit_try_run_case+0x13c/0x3ac\n\t    [\u003c00000000f3edea23\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t    [\u003c00000000adf936cf\u003e] kthread+0x2e8/0x374\n\t    [\u003c0000000041bb1628\u003e] ret_from_fork+0x10/0x20\n\tunreferenced object 0xffffff80c2a29090 (size 8):\n\t  comm \"kunit_try_catch\", pid 227, jiffies 4294894409\n\t  hex dump (first 8 bytes):\n\t    74 65 73 74 69 6e 67 00                          testing.\n\t  backtrace (crc 5eab668b):\n\t    [\u003c0000000001e3714d\u003e] kmemleak_alloc+0x34/0x40\n\t    [\u003c000000006e6c7776\u003e] __kmalloc_node_track_caller_noprof+0x300/0x3e0\n\t    [\u003c000000006870467c\u003e] kmemdup_noprof+0x34/0x60\n\t    [\u003c000000001176bb03\u003e] aa_unpack_strdup+0xd0/0x18c\n\t    [\u003c0000000046a45c1a\u003e] policy_unpack_test_unpack_strdup_with_name+0xd0/0x3c4\n\t    [\u003c0000000032ef8f77\u003e] kunit_try_run_case+0x13c/0x3ac\n\t    [\u003c00000000f3edea23\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t    [\u003c00000000adf936cf\u003e] kthread+0x2e8/0x374\n\t    [\u003c0000000041bb1628\u003e] ret_from_fork+0x10/0x20"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-20T06:27:11.671Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/f856246ff6da25c4f8fdd73a9c875e878b085e9f"
        },
        {
          "url": "https://git.kernel.org/stable/c/5354599855a9b5568e05ce686119ee3ff8b19bd5"
        },
        {
          "url": "https://git.kernel.org/stable/c/89265f88701e54dde255ddf862093baeca57548c"
        },
        {
          "url": "https://git.kernel.org/stable/c/2a9b68f2dc6812bd1b8880b5c00e60203d6f61f6"
        },
        {
          "url": "https://git.kernel.org/stable/c/59a149e7c38e7b76616c8b333fc6aa5b6fb2293c"
        },
        {
          "url": "https://git.kernel.org/stable/c/d62ee5739a66644b0e7f11e657d562458cdcdea3"
        },
        {
          "url": "https://git.kernel.org/stable/c/7290f59231910ccba427d441a6e8b8c6f6112448"
        }
      ],
      "title": "apparmor: test: Fix memory leak for aa_unpack_strdup()",
      "x_generator": {
        "engine": "bippy-5f407fcff5a0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-56741",
    "datePublished": "2024-12-29T11:30:09.843Z",
    "dateReserved": "2024-12-29T11:26:39.758Z",
    "dateUpdated": "2025-01-20T06:27:11.671Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-56741\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-12-29T12:15:07.477\",\"lastModified\":\"2025-01-07T22:19:45.437\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\napparmor: test: Fix memory leak for aa_unpack_strdup()\\n\\nThe string allocated by kmemdup() in aa_unpack_strdup() is not\\nfreed and cause following memory leaks, free them to fix it.\\n\\n\\tunreferenced object 0xffffff80c6af8a50 (size 8):\\n\\t  comm \\\"kunit_try_catch\\\", pid 225, jiffies 4294894407\\n\\t  hex dump (first 8 bytes):\\n\\t    74 65 73 74 69 6e 67 00                          testing.\\n\\t  backtrace (crc 5eab668b):\\n\\t    [\u003c0000000001e3714d\u003e] kmemleak_alloc+0x34/0x40\\n\\t    [\u003c000000006e6c7776\u003e] __kmalloc_node_track_caller_noprof+0x300/0x3e0\\n\\t    [\u003c000000006870467c\u003e] kmemdup_noprof+0x34/0x60\\n\\t    [\u003c000000001176bb03\u003e] aa_unpack_strdup+0xd0/0x18c\\n\\t    [\u003c000000008ecde918\u003e] policy_unpack_test_unpack_strdup_with_null_name+0xf8/0x3ec\\n\\t    [\u003c0000000032ef8f77\u003e] kunit_try_run_case+0x13c/0x3ac\\n\\t    [\u003c00000000f3edea23\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\\n\\t    [\u003c00000000adf936cf\u003e] kthread+0x2e8/0x374\\n\\t    [\u003c0000000041bb1628\u003e] ret_from_fork+0x10/0x20\\n\\tunreferenced object 0xffffff80c2a29090 (size 8):\\n\\t  comm \\\"kunit_try_catch\\\", pid 227, jiffies 4294894409\\n\\t  hex dump (first 8 bytes):\\n\\t    74 65 73 74 69 6e 67 00                          testing.\\n\\t  backtrace (crc 5eab668b):\\n\\t    [\u003c0000000001e3714d\u003e] kmemleak_alloc+0x34/0x40\\n\\t    [\u003c000000006e6c7776\u003e] __kmalloc_node_track_caller_noprof+0x300/0x3e0\\n\\t    [\u003c000000006870467c\u003e] kmemdup_noprof+0x34/0x60\\n\\t    [\u003c000000001176bb03\u003e] aa_unpack_strdup+0xd0/0x18c\\n\\t    [\u003c0000000046a45c1a\u003e] policy_unpack_test_unpack_strdup_with_name+0xd0/0x3c4\\n\\t    [\u003c0000000032ef8f77\u003e] kunit_try_run_case+0x13c/0x3ac\\n\\t    [\u003c00000000f3edea23\u003e] kunit_generic_run_threadfn_adapter+0x80/0xec\\n\\t    [\u003c00000000adf936cf\u003e] kthread+0x2e8/0x374\\n\\t    [\u003c0000000041bb1628\u003e] ret_from_fork+0x10/0x20\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: apparmor: prueba: Se corrige la p\u00e9rdida de memoria para aa_unpack_strdup() La cadena asignada por kmemdup() en aa_unpack_strdup() no se libera y provoca las siguientes p\u00e9rdidas de memoria; lib\u00e9rela para solucionarlo. objeto sin referencia 0xffffff80c6af8a50 (tama\u00f1o 8): comm \\\"kunit_try_catch\\\", pid 225, jiffies 4294894407 volcado hexadecimal (primeros 8 bytes): 74 65 73 74 69 6e 67 00 pruebas. seguimiento inverso (crc 5eab668b): [\u0026lt;0000000001e3714d\u0026gt;] kmemleak_alloc+0x34/0x40 [\u0026lt;000000006e6c7776\u0026gt;] __kmalloc_node_track_caller_noprof+0x300/0x3e0 [\u0026lt;000000006870467c\u0026gt;] kmemdup_noprof+0x34/0x60 [\u0026lt;000000001176bb03\u0026gt;] aa_unpack_strdup+0xd0/0x18c [\u0026lt;000000008ecde918\u0026gt;] pol\u00edtica_unpack_test_unpack_strdup_with_null_name+0xf8/0x3ec [\u0026lt;0000000032ef8f77\u0026gt;] kunit_try_run_case+0x13c/0x3ac [\u0026lt;00000000f3edea23\u0026gt;] kunit_generic_run_threadfn_adapter+0x80/0xec [\u0026lt;00000000adf936cf\u0026gt;] kthread+0x2e8/0x374 [\u0026lt;0000000041bb1628\u0026gt;] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80c2a29090 (tama\u00f1o 8): comm \\\"kunit_try_catch\\\", pid 227, jiffies 4294894409 volcado hexadecimal (primeros 8 bytes): 74 65 73 74 69 6e 67 00 prueba. seguimiento inverso (crc 5eab668b): [\u0026lt;0000000001e3714d\u0026gt;] kmemleak_alloc+0x34/0x40 [\u0026lt;000000006e6c7776\u0026gt;] __kmalloc_node_track_caller_noprof+0x300/0x3e0 [\u0026lt;000000006870467c\u0026gt;] kmemdup_noprof+0x34/0x60 [\u0026lt;000000001176bb03\u0026gt;] aa_unpack_strdup+0xd0/0x18c [\u0026lt;0000000046a45c1a\u0026gt;] pol\u00edtica_unpack_test_unpack_strdup_with_name+0xd0/0x3c4 [\u0026lt;0000000032ef8f77\u0026gt;] kunit_try_run_case+0x13c/0x3ac [\u0026lt;00000000f3edea23\u0026gt;] kunit_generic_run_threadfn_adapter+0x80/0xec [\u0026lt;00000000adf936cf\u0026gt;] kthread+0x2e8/0x374 [\u0026lt;0000000041bb1628\u0026gt;] ret_from_fork+0x10/0x20\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.6\",\"versionEndExcluding\":\"5.10.231\",\"matchCriteriaId\":\"C4BFC75B-E0F6-4CC1-BE2F-50FBE9ECC42A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.174\",\"matchCriteriaId\":\"419FD073-1517-4FD5-8158-F94BC68A1E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.120\",\"matchCriteriaId\":\"09AC6122-E2A4-40FE-9D33-268A1B2EC265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.64\",\"matchCriteriaId\":\"CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.11.11\",\"matchCriteriaId\":\"21434379-192D-472F-9B54-D45E3650E893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.12\",\"versionEndExcluding\":\"6.12.2\",\"matchCriteriaId\":\"D8882B1B-2ABC-4838-AC1D-DBDBB5764776\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2a9b68f2dc6812bd1b8880b5c00e60203d6f61f6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/5354599855a9b5568e05ce686119ee3ff8b19bd5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/59a149e7c38e7b76616c8b333fc6aa5b6fb2293c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/7290f59231910ccba427d441a6e8b8c6f6112448\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/89265f88701e54dde255ddf862093baeca57548c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d62ee5739a66644b0e7f11e657d562458cdcdea3\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f856246ff6da25c4f8fdd73a9c875e878b085e9f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.