Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2024-53181
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-27 Dec, 2024 | 13:49
Updated At-05 Jan, 2026 | 10:55
Rejected At-
▼CVE Numbering Authority (CNA)
um: vector: Do not use drvdata in release

In the Linux kernel, the following vulnerability has been resolved: um: vector: Do not use drvdata in release The drvdata is not available in release. Let's just use container_of() to get the vector_device instance. Otherwise, removing a vector device will result in a crash: RIP: 0033:vector_device_release+0xf/0x50 RSP: 00000000e187bc40 EFLAGS: 00010202 RAX: 0000000060028f61 RBX: 00000000600f1baf RCX: 00000000620074e0 RDX: 000000006220b9c0 RSI: 0000000060551c80 RDI: 0000000000000000 RBP: 00000000e187bc50 R08: 00000000603ad594 R09: 00000000e187bb70 R10: 000000000000135a R11: 00000000603ad422 R12: 00000000623ae028 R13: 000000006287a200 R14: 0000000062006d30 R15: 00000000623700b6 Kernel panic - not syncing: Segfault with no mm CPU: 0 UID: 0 PID: 16 Comm: kworker/0:1 Not tainted 6.12.0-rc6-g59b723cd2adb #1 Workqueue: events mc_work_proc Stack: 60028f61 623ae028 e187bc80 60276fcd 6220b9c0 603f5820 623ae028 00000000 e187bcb0 603a2bcd 623ae000 62370010 Call Trace: [<60028f61>] ? vector_device_release+0x0/0x50 [<60276fcd>] device_release+0x70/0xba [<603a2bcd>] kobject_put+0xba/0xe7 [<60277265>] put_device+0x19/0x1c [<60281266>] platform_device_put+0x26/0x29 [<60281e5f>] platform_device_unregister+0x2c/0x2e [<60029422>] vector_remove+0x52/0x58 [<60031316>] ? mconsole_reply+0x0/0x50 [<600310c8>] mconsole_remove+0x160/0x1cc [<603b19f4>] ? strlen+0x0/0x15 [<60066611>] ? __dequeue_entity+0x1a9/0x206 [<600666a7>] ? set_next_entity+0x39/0x63 [<6006666e>] ? set_next_entity+0x0/0x63 [<60038fa6>] ? um_set_signals+0x0/0x43 [<6003070c>] mc_work_proc+0x77/0x91 [<60057664>] process_scheduled_works+0x1b3/0x2dd [<60055f32>] ? assign_work+0x0/0x58 [<60057f0a>] worker_thread+0x1e9/0x293 [<6005406f>] ? set_pf_worker+0x0/0x64 [<6005d65d>] ? arch_local_irq_save+0x0/0x2d [<6005d748>] ? kthread_exit+0x0/0x3a [<60057d21>] ? worker_thread+0x0/0x293 [<6005dbf1>] kthread+0x126/0x12b [<600219c5>] new_thread_handler+0x85/0xb6

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/um/drivers/vector_kern.c
Default Status
unaffected
Versions
Affected
  • From 49da7e64f33e80edffb1a9eeb230fa4c3f42dffb before 8ed7793f6f589b4e1f0b38f8448578d2a48f9c82 (git)
  • From 49da7e64f33e80edffb1a9eeb230fa4c3f42dffb before 376c7f0beb8f6f3800fc3013ef2f422d0cbfbf92 (git)
  • From 49da7e64f33e80edffb1a9eeb230fa4c3f42dffb before 35f8f72b45791a6a71b81140c59d02a6183b6f3b (git)
  • From 49da7e64f33e80edffb1a9eeb230fa4c3f42dffb before bef9a2835011668c221851a7572b6c8433087f85 (git)
  • From 49da7e64f33e80edffb1a9eeb230fa4c3f42dffb before dc5251b1af5c9a0749322bf58bd5aa673f545fe2 (git)
  • From 49da7e64f33e80edffb1a9eeb230fa4c3f42dffb before 8204dd589c4f25a7618eece5da3f0871e02af8ae (git)
  • From 49da7e64f33e80edffb1a9eeb230fa4c3f42dffb before e9d36f7e71a907ec507f84ee5d60a622c345cac4 (git)
  • From 49da7e64f33e80edffb1a9eeb230fa4c3f42dffb before 12f52e373d63f008ee386f371bdd82a3a3779199 (git)
  • From 49da7e64f33e80edffb1a9eeb230fa4c3f42dffb before 51b39d741970742a5c41136241a9c48ac607cf82 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • arch/um/drivers/vector_kern.c
Default Status
affected
Versions
Affected
  • 4.17
Unaffected
  • From 0 before 4.17 (semver)
  • From 4.19.325 through 4.19.* (semver)
  • From 5.4.287 through 5.4.* (semver)
  • From 5.10.231 through 5.10.* (semver)
  • From 5.15.174 through 5.15.* (semver)
  • From 6.1.120 through 6.1.* (semver)
  • From 6.6.64 through 6.6.* (semver)
  • From 6.11.11 through 6.11.* (semver)
  • From 6.12.2 through 6.12.* (semver)
  • From 6.13 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/8ed7793f6f589b4e1f0b38f8448578d2a48f9c82
N/A
https://git.kernel.org/stable/c/376c7f0beb8f6f3800fc3013ef2f422d0cbfbf92
N/A
https://git.kernel.org/stable/c/35f8f72b45791a6a71b81140c59d02a6183b6f3b
N/A
https://git.kernel.org/stable/c/bef9a2835011668c221851a7572b6c8433087f85
N/A
https://git.kernel.org/stable/c/dc5251b1af5c9a0749322bf58bd5aa673f545fe2
N/A
https://git.kernel.org/stable/c/8204dd589c4f25a7618eece5da3f0871e02af8ae
N/A
https://git.kernel.org/stable/c/e9d36f7e71a907ec507f84ee5d60a622c345cac4
N/A
https://git.kernel.org/stable/c/12f52e373d63f008ee386f371bdd82a3a3779199
N/A
https://git.kernel.org/stable/c/51b39d741970742a5c41136241a9c48ac607cf82
N/A
Hyperlink: https://git.kernel.org/stable/c/8ed7793f6f589b4e1f0b38f8448578d2a48f9c82
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/376c7f0beb8f6f3800fc3013ef2f422d0cbfbf92
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/35f8f72b45791a6a71b81140c59d02a6183b6f3b
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/bef9a2835011668c221851a7572b6c8433087f85
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/dc5251b1af5c9a0749322bf58bd5aa673f545fe2
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/8204dd589c4f25a7618eece5da3f0871e02af8ae
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/e9d36f7e71a907ec507f84ee5d60a622c345cac4
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/12f52e373d63f008ee386f371bdd82a3a3779199
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/51b39d741970742a5c41136241a9c48ac607cf82
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
N/A
https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html
Resource: N/A
Details not found