{"id":"CVE-2024-27052","summary":"wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work\n\nThe workqueue might still be running, when the driver is stopped. To\navoid a use-after-free, call cancel_work_sync() in rtl8xxxu_stop().","modified":"2026-04-02T10:06:59.637277Z","published":"2024-05-01T12:54:42.547Z","related":["ALSA-2024:5363","SUSE-SU-2024:2008-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2190-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27052.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1213acb478a7181cd73eeaf00db430f1e45b1361"},{"type":"WEB","url":"https://git.kernel.org/stable/c/156012667b85ca7305cb363790d3ae8519a6f41e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3518cea837de4d106efa84ddac18a07b6de1384e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/58fe3bbddfec10c6b216096d8c0e517cd8463e3a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7059cdb69f8e1a2707dd1e2f363348b507ed7707"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ac512507ac89c01ed6cd4ca53032f52cdb23ea59"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dddedfa3b29a63c2ca4336663806a6128b8545b4"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/27xxx/CVE-2024-27052.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27052"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"e542e66b7c2ee2adeefdbb7f259f2f60cadf2819"},{"fixed":"dddedfa3b29a63c2ca4336663806a6128b8545b4"},{"fixed":"ac512507ac89c01ed6cd4ca53032f52cdb23ea59"},{"fixed":"3518cea837de4d106efa84ddac18a07b6de1384e"},{"fixed":"156012667b85ca7305cb363790d3ae8519a6f41e"},{"fixed":"7059cdb69f8e1a2707dd1e2f363348b507ed7707"},{"fixed":"58fe3bbddfec10c6b216096d8c0e517cd8463e3a"},{"fixed":"1213acb478a7181cd73eeaf00db430f1e45b1361"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-27052.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}