Linux Kernel Selftest development
 help / color / mirror / Atom feed
* CVE-2024-56741: apparmor: test: Fix memory leak for aa_unpack_strdup()
@ 2025-03-02 17:36 Ben Hutchings
  2025-03-03  8:14 ` Greg KH
  0 siblings, 1 reply; 2+ messages in thread
From: Ben Hutchings @ 2025-03-02 17:36 UTC (permalink / raw)
  To: John Johansen, Jinjie Ruan, cve; +Cc: apparmor, linux-kselftest, kunit-dev

[-- Attachment #1: Type: text/plain, Size: 1147 bytes --]

Hi all,

CVE-2024-56741 is supposed to be fixed by commit 7290f5923191 "apparmor:
test: Fix memory leak for aa_unpack_strdup()" but I think this
assignment should be rejected.

While a user-triggered memory leak may be exploitable for denial-of-
service, the code that was fixed here is a part of KUnit tests.
KUnit tests usually run a single time at boot, not under user control,
and can then later be invoked through debugfs by the root user.

Firstly, it is intended that the root user can deny service through the
reboot system call, so I don't think additional ways to do this are
security flaws.

Secondly, the KUnit documentation at <https://docs.kernel.org/dev-
tools/kunit/run_manual.html> says:

    Note:

    KUnit is not designed for use in a production system. It is possible
    that tests may reduce the stability or security of the system.

so I don't think security issues in KUnit tests generally deserve CVE
IDs.  (That said, the help text for CONFIG_KUNIT does not have such a
warning.)

Ben.

-- 
Ben Hutchings
Any smoothly functioning technology is indistinguishable
from a rigged demo.


[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 833 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2025-03-03  8:15 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-03-02 17:36 CVE-2024-56741: apparmor: test: Fix memory leak for aa_unpack_strdup() Ben Hutchings
2025-03-03  8:14 ` Greg KH

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox