๐Ÿ” CVE Alert

CVE-2024-53183

UNKNOWN 0.0

um: net: Do not use drvdata in release

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: um: net: Do not use drvdata in release The drvdata is not available in release. Let's just use container_of() to get the uml_net instance. Otherwise, removing a network device will result in a crash: RIP: 0033:net_device_release+0x10/0x6f RSP: 00000000e20c7c40 EFLAGS: 00010206 RAX: 000000006002e4e7 RBX: 00000000600f1baf RCX: 00000000624074e0 RDX: 0000000062778000 RSI: 0000000060551c80 RDI: 00000000627af028 RBP: 00000000e20c7c50 R08: 00000000603ad594 R09: 00000000e20c7b70 R10: 000000000000135a R11: 00000000603ad422 R12: 0000000000000000 R13: 0000000062c7af00 R14: 0000000062406d60 R15: 00000000627700b6 Kernel panic - not syncing: Segfault with no mm CPU: 0 UID: 0 PID: 29 Comm: kworker/0:2 Not tainted 6.12.0-rc6-g59b723cd2adb #1 Workqueue: events mc_work_proc Stack: 627af028 62c7af00 e20c7c80 60276fcd 62778000 603f5820 627af028 00000000 e20c7cb0 603a2bcd 627af000 62770010 Call Trace: [<60276fcd>] device_release+0x70/0xba [<603a2bcd>] kobject_put+0xba/0xe7 [<60277265>] put_device+0x19/0x1c [<60281266>] platform_device_put+0x26/0x29 [<60281e5f>] platform_device_unregister+0x2c/0x2e [<6002ec9c>] net_remove+0x63/0x69 [<60031316>] ? mconsole_reply+0x0/0x50 [<600310c8>] mconsole_remove+0x160/0x1cc [<60087d40>] ? __remove_hrtimer+0x38/0x74 [<60087ff8>] ? hrtimer_try_to_cancel+0x8c/0x98 [<6006b3cf>] ? dl_server_stop+0x3f/0x48 [<6006b390>] ? dl_server_stop+0x0/0x48 [<600672e8>] ? dequeue_entities+0x327/0x390 [<60038fa6>] ? um_set_signals+0x0/0x43 [<6003070c>] mc_work_proc+0x77/0x91 [<60057664>] process_scheduled_works+0x1b3/0x2dd [<60055f32>] ? assign_work+0x0/0x58 [<60057f0a>] worker_thread+0x1e9/0x293 [<6005406f>] ? set_pf_worker+0x0/0x64 [<6005d65d>] ? arch_local_irq_save+0x0/0x2d [<6005d748>] ? kthread_exit+0x0/0x3a [<60057d21>] ? worker_thread+0x0/0x293 [<6005dbf1>] kthread+0x126/0x12b [<600219c5>] new_thread_handler+0x85/0xb6

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 27, 2024
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2e3f5251ac716879df6b6271f243f657c6e02e9a < b174ab33aaafd556a1ead72fa8e35d70b6fb1e39 2e3f5251ac716879df6b6271f243f657c6e02e9a < 8d9d174d3f55daaf5e7b48e9d7f53c723adbed86 2e3f5251ac716879df6b6271f243f657c6e02e9a < 6be99d4c117b9642a44d9f54f034b67615be2b2b 2e3f5251ac716879df6b6271f243f657c6e02e9a < 1635d9a0ff1b8bd7aa4767d4ea7b3de72cd36f28 2e3f5251ac716879df6b6271f243f657c6e02e9a < 160cd5f956d191eb97664afd31ca59284c08d876 2e3f5251ac716879df6b6271f243f657c6e02e9a < cdbd5a1dcdc2c27ac076f91b03b9add3fefa1a82 2e3f5251ac716879df6b6271f243f657c6e02e9a < 468c2e5394afc848efb1eae6e1961a3c855cf35e 2e3f5251ac716879df6b6271f243f657c6e02e9a < f04cd022ee1fde219e0db1086c27a0a5ba1914db 2e3f5251ac716879df6b6271f243f657c6e02e9a < d1db692a9be3b4bd3473b64fcae996afaffe8438
Linux / Linux
2.6.22

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b174ab33aaafd556a1ead72fa8e35d70b6fb1e39 git.kernel.org: https://git.kernel.org/stable/c/8d9d174d3f55daaf5e7b48e9d7f53c723adbed86 git.kernel.org: https://git.kernel.org/stable/c/6be99d4c117b9642a44d9f54f034b67615be2b2b git.kernel.org: https://git.kernel.org/stable/c/1635d9a0ff1b8bd7aa4767d4ea7b3de72cd36f28 git.kernel.org: https://git.kernel.org/stable/c/160cd5f956d191eb97664afd31ca59284c08d876 git.kernel.org: https://git.kernel.org/stable/c/cdbd5a1dcdc2c27ac076f91b03b9add3fefa1a82 git.kernel.org: https://git.kernel.org/stable/c/468c2e5394afc848efb1eae6e1961a3c855cf35e git.kernel.org: https://git.kernel.org/stable/c/f04cd022ee1fde219e0db1086c27a0a5ba1914db git.kernel.org: https://git.kernel.org/stable/c/d1db692a9be3b4bd3473b64fcae996afaffe8438 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html