CVE-2024-27052Use After Free in Linux

CWE-416Use After Free36 documents7 sources
Severity
7.4HIGHNVD
OSV7.0OSV6.5OSV5.5
EPSS
0.0%
top 98.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 1
Latest updateJul 26

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work The workqueue might still be running, when the driver is stopped. To avoid a use-after-free, call cancel_work_sync() in rtl8xxxu_stop().

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 1.4 | Impact: 5.9

Affected Packages5 packages

NVDlinux/linux_kernel5.55.10.214+5
Debianlinux/linux_kernel< 5.10.216-1+3
Ubuntulinux/linux_kernel< 5.15.0-112.122+1
CVEListV5linux/linuxe542e66b7c2ee2adeefdbb7f259f2f60cadf2819dddedfa3b29a63c2ca4336663806a6128b8545b4+7
debiandebian/linux< linux 6.1.85-1 (bookworm)

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

17
OSV
linux-raspi vulnerabilities2024-07-26
OSV
linux-ibm-5.15 vulnerabilities2024-07-10
OSV
linux-hwe-5.15 vulnerabilities2024-07-04
OSV
linux-oracle vulnerabilities2024-07-04
OSV
linux-azure, linux-azure-fde vulnerabilities2024-06-14

📋Vendor Advisories

17
Ubuntu
Linux kernel vulnerabilities2024-07-26
Ubuntu
Linux kernel (IBM) vulnerabilities2024-07-10
Ubuntu
Linux kernel (Oracle) vulnerabilities2024-07-04
Ubuntu
Linux kernel (HWE) vulnerabilities2024-07-04
Ubuntu
Linux kernel vulnerabilities2024-06-14

💬Community

1
Bugzilla
CVE-2024-27052 kernel: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work2024-05-01