CVE-2024-53128Type Confusion in Linux

CWE-843Type Confusion50 documents7 sources
Severity
5.5MEDIUMNVD
OSV8.8
EPSS
0.0%
top 93.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 4
Latest updateSep 2

Description

In the Linux kernel, the following vulnerability has been resolved: sched/task_stack: fix object_is_on_stack() for KASAN tagged pointers When CONFIG_KASAN_SW_TAGS and CONFIG_KASAN_STACK are enabled, the object_is_on_stack() function may produce incorrect results due to the presence of tags in the obj pointer, while the stack pointer does not have tags. This discrepancy can lead to incorrect stack object detection and subsequently trigger warnings if CONFIG_DEBUG_OBJECTS is also enabled. Examp

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages9 packages

Patches

🔴Vulnerability Details

24
OSV
linux-azure-5.15 vulnerabilities2025-09-02
OSV
linux-azure-fips vulnerabilities2025-08-22
OSV
linux-azure vulnerabilities2025-08-22
OSV
linux-raspi vulnerabilities2025-08-05
OSV
linux-xilinx-zynqmp vulnerabilities2025-07-29

📋Vendor Advisories

25
Ubuntu
Linux kernel (Azure) vulnerabilities2025-09-02
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2025-08-22
Ubuntu
Linux kernel (Azure) vulnerabilities2025-08-22
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-08-05
Ubuntu
Linux kernel (Xilinx ZynqMP) vulnerabilities2025-07-29