
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-43830 affects the Linux kernel's LED trigger subsystem. The vulnerability was discovered and disclosed in August 2024, specifically related to a race condition in the LED trigger deactivation process. The issue affects various Linux kernel versions that implement LED triggers with sysfs attributes (Kernel Git).
The vulnerability stems from an incorrect ordering of operations during LED trigger deactivation. When triggers have specific sysfs attributes, they store related data in trigger-data that is allocated by the activate() callback and freed by the deactivate() callback. The issue occurs because deviceremovegroups() was called after deactivate(), creating a race window where sysfs attributes show/store functions could be called after deactivation and operate on freed trigger-data (Kernel Git).
The vulnerability could potentially lead to use-after-free conditions when accessing LED trigger attributes through sysfs, as the sysfs attributes might attempt to operate on memory that has already been freed. This could result in system instability or potential security implications (NVD).
The issue has been fixed by moving the deviceremovegroups() call to before deactivate() to close the race window. This change also makes the deactivation path properly do things in reverse order of the activation path. The fix has been implemented in various Linux distributions including Ubuntu and Oracle Linux (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."