In the Linux kernel, the following vulnerability has been resolved:
wifi: rtlwifi: remove unused check_buddy_priv
Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global
list of private data structures.
Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match
vendor version 2013.02.07") started adding the private data to that list at
probe time and added a hook, check_buddy_priv to find the private data from
a similar device.
However, that function was never used.
Besides, though there is a lock for that list, it is never used. And when
the probe fails, the private data is never removed from the list. This
would cause a second probe to access freed memory.
Remove the unused hook, structures and members, which will prevent the
potential race condition on the list and its corruption during a second
probe when probe fails.
References
Configurations
Configuration 1 (hide)
|
History
30 Oct 2025, 21:26
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/006e803af7408c3fc815b0654fc5ab43d34f0154 - Patch | |
| References | () https://git.kernel.org/stable/c/1b9cbd8a9ae68b32099fbb03b2d5ffa0c5e0dcc9 - Patch | |
| References | () https://git.kernel.org/stable/c/1e39b0486cdb496cdfba3bc89886150e46acf6f4 - Patch | |
| References | () https://git.kernel.org/stable/c/2fdac64c3c35858aa8ac5caa70b232e03456e120 - Patch | |
| References | () https://git.kernel.org/stable/c/465d01ef6962b82b1f0ad1f3e58b398dbd35c1c1 - Patch | |
| References | () https://git.kernel.org/stable/c/543e3e9f2e9e47ded774c74e680f28a0ca362aee - Patch | |
| References | () https://git.kernel.org/stable/c/8e2fcc68fbaab3ad9f5671fee2be0956134b740a - Patch | |
| References | () https://git.kernel.org/stable/c/f801e754efa21bd61b3cc15ec7565696165b272f - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-416 | |
| First Time |
Linux linux Kernel
Linux |
13 Mar 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
06 Mar 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-06 16:15
Updated : 2025-10-30 21:26
NVD link : CVE-2024-58072
Mitre link : CVE-2024-58072
CVE.ORG link : CVE-2024-58072
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
