CVE-2024-58072
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
06/03/2025
Last modified:
12/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: rtlwifi: remove unused check_buddy_priv<br />
<br />
Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global<br />
list of private data structures.<br />
<br />
Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match<br />
vendor version 2013.02.07") started adding the private data to that list at<br />
probe time and added a hook, check_buddy_priv to find the private data from<br />
a similar device.<br />
<br />
However, that function was never used.<br />
<br />
Besides, though there is a lock for that list, it is never used. And when<br />
the probe fails, the private data is never removed from the list. This<br />
would cause a second probe to access freed memory.<br />
<br />
Remove the unused hook, structures and members, which will prevent the<br />
potential race condition on the list and its corruption during a second<br />
probe when probe fails.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.10 (including) | 5.4.291 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.235 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.179 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.129 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.76 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/006e803af7408c3fc815b0654fc5ab43d34f0154
- https://git.kernel.org/stable/c/1b9cbd8a9ae68b32099fbb03b2d5ffa0c5e0dcc9
- https://git.kernel.org/stable/c/1e39b0486cdb496cdfba3bc89886150e46acf6f4
- https://git.kernel.org/stable/c/2fdac64c3c35858aa8ac5caa70b232e03456e120
- https://git.kernel.org/stable/c/465d01ef6962b82b1f0ad1f3e58b398dbd35c1c1
- https://git.kernel.org/stable/c/543e3e9f2e9e47ded774c74e680f28a0ca362aee
- https://git.kernel.org/stable/c/8e2fcc68fbaab3ad9f5671fee2be0956134b740a
- https://git.kernel.org/stable/c/f801e754efa21bd61b3cc15ec7565696165b272f
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://cert-portal.siemens.com/productcert/html/ssa-265688.html



