CVE-2024-27053 — NULL Pointer Dereference in Linux
Severity
9.1CRITICALNVD
OSV7.0OSV6.5OSV5.5
EPSS
0.1%
top 68.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 1
Latest updateJul 26
Description
In the Linux kernel, the following vulnerability has been resolved:
wifi: wilc1000: fix RCU usage in connect path
With lockdep enabled, calls to the connect function from cfg802.11 layer
lead to the following warning:
WARNING: suspicious RCU usage
6.7.0-rc1-wt+ #333 Not tainted
drivers/net/wireless/microchip/wilc1000/hif.c:386
suspicious rcu_dereference_check() usage!
[...]
stack backtrace:
CPU: 0 PID: 100 Comm: wpa_supplicant Not tainted 6.7.0-rc1-wt+ #333
Hardware name: Atmel SAMA5
unwind_b…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2
Affected Packages9 packages
▶CVEListV5linux/linuxc460495ee072fc01a9b1e8d72c179510418cafac — e556006de4ea93abe2b46cba202a2556c544b8b2+8
Also affects: Debian Linux 10.0