Vulnerability identifier: #VU90180
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-27052
CWE-ID:
CWE-416
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the rtl8xxxu_stop() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c. A local user can escalate privileges on the system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://git.kernel.org/stable/c/dddedfa3b29a63c2ca4336663806a6128b8545b4
https://git.kernel.org/stable/c/ac512507ac89c01ed6cd4ca53032f52cdb23ea59
https://git.kernel.org/stable/c/3518cea837de4d106efa84ddac18a07b6de1384e
https://git.kernel.org/stable/c/156012667b85ca7305cb363790d3ae8519a6f41e
https://git.kernel.org/stable/c/7059cdb69f8e1a2707dd1e2f363348b507ed7707
https://git.kernel.org/stable/c/58fe3bbddfec10c6b216096d8c0e517cd8463e3a
https://git.kernel.org/stable/c/1213acb478a7181cd73eeaf00db430f1e45b1361
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.