CVE-2024-58072

Severity CVSS v4.0:
Pending analysis
Type:
CWE-416 Use After Free
Publication date:
06/03/2025
Last modified:
12/05/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: rtlwifi: remove unused check_buddy_priv<br /> <br /> Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global<br /> list of private data structures.<br /> <br /> Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match<br /> vendor version 2013.02.07") started adding the private data to that list at<br /> probe time and added a hook, check_buddy_priv to find the private data from<br /> a similar device.<br /> <br /> However, that function was never used.<br /> <br /> Besides, though there is a lock for that list, it is never used. And when<br /> the probe fails, the private data is never removed from the list. This<br /> would cause a second probe to access freed memory.<br /> <br /> Remove the unused hook, structures and members, which will prevent the<br /> potential race condition on the list and its corruption during a second<br /> probe when probe fails.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.10 (including) 5.4.291 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.235 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.179 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.129 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.76 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.13 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.13.2 (excluding)