Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-53172
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-27 Dec, 2024 | 13:49
Updated At-03 Nov, 2025 | 20:47
Rejected At-
▼CVE Numbering Authority (CNA)
ubi: fastmap: Fix duplicate slab cache names while attaching

In the Linux kernel, the following vulnerability has been resolved: ubi: fastmap: Fix duplicate slab cache names while attaching Since commit 4c39529663b9 ("slab: Warn on duplicate cache names when DEBUG_VM=y"), the duplicate slab cache names can be detected and a kernel WARNING is thrown out. In UBI fast attaching process, alloc_ai() could be invoked twice with the same slab cache name 'ubi_aeb_slab_cache', which will trigger following warning messages: kmem_cache of name 'ubi_aeb_slab_cache' already exists WARNING: CPU: 0 PID: 7519 at mm/slab_common.c:107 __kmem_cache_create_args+0x100/0x5f0 Modules linked in: ubi(+) nandsim [last unloaded: nandsim] CPU: 0 UID: 0 PID: 7519 Comm: modprobe Tainted: G 6.12.0-rc2 RIP: 0010:__kmem_cache_create_args+0x100/0x5f0 Call Trace: __kmem_cache_create_args+0x100/0x5f0 alloc_ai+0x295/0x3f0 [ubi] ubi_attach+0x3c3/0xcc0 [ubi] ubi_attach_mtd_dev+0x17cf/0x3fa0 [ubi] ubi_init+0x3fb/0x800 [ubi] do_init_module+0x265/0x7d0 __x64_sys_finit_module+0x7a/0xc0 The problem could be easily reproduced by loading UBI device by fastmap with CONFIG_DEBUG_VM=y. Fix it by using different slab names for alloc_ai() callers.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/mtd/ubi/attach.c
Default Status
unaffected
Versions
Affected
  • From d2158f69a7d469c21c37f7028c18aa8c54707de3 before ef52b7191ac41e68b1bf070d00c5b04ed16e4920 (git)
  • From d2158f69a7d469c21c37f7028c18aa8c54707de3 before 871c148f8e0c32e505df9393ba4a303c3c3fe988 (git)
  • From d2158f69a7d469c21c37f7028c18aa8c54707de3 before 04c0b0f37617099479c34e207c5550d081f585a6 (git)
  • From d2158f69a7d469c21c37f7028c18aa8c54707de3 before b1ee0aa4945c49cbbd779da81040fcec4de80fd1 (git)
  • From d2158f69a7d469c21c37f7028c18aa8c54707de3 before 6afdcb285794e75d2c8995e3a44f523c176cc2de (git)
  • From d2158f69a7d469c21c37f7028c18aa8c54707de3 before 612824dd0c9465ef365ace38b056c663d110956d (git)
  • From d2158f69a7d469c21c37f7028c18aa8c54707de3 before 3d8558135cd56a2a8052024be4073e160f36658c (git)
  • From d2158f69a7d469c21c37f7028c18aa8c54707de3 before 7402c4bcb8a3f0d2ef4e687cd45c76be489cf509 (git)
  • From d2158f69a7d469c21c37f7028c18aa8c54707de3 before bcddf52b7a17adcebc768d26f4e27cf79adb424c (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/mtd/ubi/attach.c
Default Status
affected
Versions
Affected
  • 4.1
Unaffected
  • From 0 before 4.1 (semver)
  • From 4.19.325 through 4.19.* (semver)
  • From 5.4.287 through 5.4.* (semver)
  • From 5.10.231 through 5.10.* (semver)
  • From 5.15.174 through 5.15.* (semver)
  • From 6.1.120 through 6.1.* (semver)
  • From 6.6.64 through 6.6.* (semver)
  • From 6.11.11 through 6.11.* (semver)
  • From 6.12.2 through 6.12.* (semver)
  • From 6.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/ef52b7191ac41e68b1bf070d00c5b04ed16e4920
N/A
https://git.kernel.org/stable/c/871c148f8e0c32e505df9393ba4a303c3c3fe988
N/A
https://git.kernel.org/stable/c/04c0b0f37617099479c34e207c5550d081f585a6
N/A
https://git.kernel.org/stable/c/b1ee0aa4945c49cbbd779da81040fcec4de80fd1
N/A
https://git.kernel.org/stable/c/6afdcb285794e75d2c8995e3a44f523c176cc2de
N/A
https://git.kernel.org/stable/c/612824dd0c9465ef365ace38b056c663d110956d
N/A
https://git.kernel.org/stable/c/3d8558135cd56a2a8052024be4073e160f36658c
N/A
https://git.kernel.org/stable/c/7402c4bcb8a3f0d2ef4e687cd45c76be489cf509
N/A
https://git.kernel.org/stable/c/bcddf52b7a17adcebc768d26f4e27cf79adb424c
N/A
Hyperlink: https://git.kernel.org/stable/c/ef52b7191ac41e68b1bf070d00c5b04ed16e4920
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/871c148f8e0c32e505df9393ba4a303c3c3fe988
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/04c0b0f37617099479c34e207c5550d081f585a6
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/b1ee0aa4945c49cbbd779da81040fcec4de80fd1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6afdcb285794e75d2c8995e3a44f523c176cc2de
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/612824dd0c9465ef365ace38b056c663d110956d
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/3d8558135cd56a2a8052024be4073e160f36658c
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7402c4bcb8a3f0d2ef4e687cd45c76be489cf509
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/bcddf52b7a17adcebc768d26f4e27cf79adb424c
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
N/A
https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
Resource: N/A
Details not found