{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T11:59:34.854","vulnerabilities":[{"cve":{"id":"CVE-2024-50068","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2024-10-29T01:15:04.107","lastModified":"2025-10-01T21:15:43.460","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/tests/sysfs-kunit.h: fix memory leak in damon_sysfs_test_add_targets()\n\nThe sysfs_target->regions allocated in damon_sysfs_regions_alloc() is not\nfreed in damon_sysfs_test_add_targets(), which cause the following memory\nleak, free it to fix it.\n\n\tunreferenced object 0xffffff80c2a8db80 (size 96):\n\t  comm \"kunit_try_catch\", pid 187, jiffies 4294894363\n\t  hex dump (first 32 bytes):\n\t    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n\t    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n\t  backtrace (crc 0):\n\t    [<0000000001e3714d>] kmemleak_alloc+0x34/0x40\n\t    [<000000008e6835c1>] __kmalloc_cache_noprof+0x26c/0x2f4\n\t    [<000000001286d9f8>] damon_sysfs_test_add_targets+0x1cc/0x738\n\t    [<0000000032ef8f77>] kunit_try_run_case+0x13c/0x3ac\n\t    [<00000000f3edea23>] kunit_generic_run_threadfn_adapter+0x80/0xec\n\t    [<00000000adf936cf>] kthread+0x2e8/0x374\n\t    [<0000000041bb1628>] ret_from_fork+0x10/0x20"},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/damon/tests/sysfs-kunit.h: corrige pérdida de memoria en damon_sysfs_test_add_targets(). La región sysfs_target-&gt;regions asignada en damon_sysfs_regions_alloc() no se libera en damon_sysfs_test_add_targets(), lo que causa la siguiente pérdida de memoria; libérela para corregirla. objeto sin referencia 0xffffff80c2a8db80 (tamaño 96): comm \"kunit_try_catch\", pid 187, jiffies 4294894363 volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): [&lt;0000000001e3714d&gt;] kmemleak_alloc+0x34/0x40 [&lt;000000008e6835c1&gt;] __kmalloc_cache_noprof+0x26c/0x2f4 [&lt;000000001286d9f8&gt;] damon_sysfs_test_add_targets+0x1cc/0x738 [&lt;0000000032ef8f77&gt;] kunit_try_run_case+0x13c/0x3ac [&lt;00000000f3edea23&gt;] kunit_generic_run_threadfn_adapter+0x80/0xec [&lt;00000000adf936cf&gt;] kthread+0x2e8/0x374 [&lt;0000000041bb1628&gt;] ret_from_fork+0x10/0x20"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-401"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.11.5","matchCriteriaId":"6E62D61A-F704-44DB-A311-17B7534DA7BC"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*","matchCriteriaId":"7F361E1D-580F-4A2D-A509-7615F73167A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*","matchCriteriaId":"925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*","matchCriteriaId":"3C95E234-D335-4B6C-96BF-E2CEBD8654ED"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/05d43455f6bffa6abc7b937ca58be00452e6973f","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https://git.kernel.org/stable/c/2d6a1c835685de3b0c8e8dc871f60f4ef92ab01a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}