CVE-2024-43830
leds: trigger: Unregister sysfs attributes before calling deactivate()
Description
In the Linux kernel, the following vulnerability has been resolved: leds: trigger: Unregister sysfs attributes before calling deactivate() Triggers which have trigger specific sysfs attributes typically store related data in trigger-data allocated by the activate() callback and freed by the deactivate() callback. Calling device_remove_groups() after calling deactivate() leaves a window where the sysfs attributes show/store functions could be called after deactivation and then operate on the just freed trigger-data. Move the device_remove_groups() call to before deactivate() to close this race window. This also makes the deactivation path properly do things in reverse order of the activation path which calls the activate() callback before calling device_add_groups().
INFO
Published Date :
Aug. 17, 2024, 10:15 a.m.
Last Modified :
Nov. 3, 2025, 10:18 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | HIGH | [email protected] |
Solution
- Update the affected Linux kernel packages.
- Follow vendor guidance to apply the update.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-43830.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-43830 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-43830
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-43830 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2024-43830 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 03, 2025
Action Type Old Value New Value Added Reference https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html Added Reference https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html -
Initial Analysis by [email protected]
Oct. 10, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-416 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.10.3 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.44 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.165 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.224 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.282 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.103 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.19 up to (excluding) 4.19.320 Added Reference Type kernel.org: https://git.kernel.org/stable/c/0788a6f3523d3686a9eed5ea1e6fcce6841277b2 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/09c1583f0e10c918855d6e7540a79461a353e5d6 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/3fb6a9d67cfd812a547ac73ec02e1077c26c640d Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/734ba6437e80dfc780e9ee9d95f912392d12b5ea Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/c0dc9adf9474ecb7106e60e5472577375aedaed3 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/c3b7a650c8717aa89df318364609c86cbc040156 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/cb8aa9d2a4c8a15d6a43ccf901ef3d094aa60374 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/d1415125b701ef13370e2761f691ec632a5eb93a Types: Patch -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Aug. 19, 2024
Action Type Old Value New Value Added Reference kernel.org https://git.kernel.org/stable/c/c3b7a650c8717aa89df318364609c86cbc040156 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/d1415125b701ef13370e2761f691ec632a5eb93a [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/09c1583f0e10c918855d6e7540a79461a353e5d6 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/3fb6a9d67cfd812a547ac73ec02e1077c26c640d [No types assigned] -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Aug. 17, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: leds: trigger: Unregister sysfs attributes before calling deactivate() Triggers which have trigger specific sysfs attributes typically store related data in trigger-data allocated by the activate() callback and freed by the deactivate() callback. Calling device_remove_groups() after calling deactivate() leaves a window where the sysfs attributes show/store functions could be called after deactivation and then operate on the just freed trigger-data. Move the device_remove_groups() call to before deactivate() to close this race window. This also makes the deactivation path properly do things in reverse order of the activation path which calls the activate() callback before calling device_add_groups(). Added Reference kernel.org https://git.kernel.org/stable/c/734ba6437e80dfc780e9ee9d95f912392d12b5ea [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/cb8aa9d2a4c8a15d6a43ccf901ef3d094aa60374 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/0788a6f3523d3686a9eed5ea1e6fcce6841277b2 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/c0dc9adf9474ecb7106e60e5472577375aedaed3 [No types assigned]