In the Linux kernel, the following vulnerability has been resolved:
wifi: rtlwifi: remove unused check_buddy_priv
Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global
list of private data structures.
Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match
vendor version 2013.02.07") started adding the private data to that list at
probe time and added a hook, check_buddy_priv to find the private data from
a similar device.
However, that function was never used.
Besides, though there is a lock for that list, it is never used. And when
the probe fails, the private data is never removed from the list. This
would cause a second probe to access freed memory.
Remove the unused hook, structures and members, which will prevent the
potential race condition on the list and its corruption during a second
probe when probe fails.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    03 Nov 2025, 20:17
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
30 Oct 2025, 21:26
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://git.kernel.org/stable/c/006e803af7408c3fc815b0654fc5ab43d34f0154 - Patch | |
| References | () https://git.kernel.org/stable/c/1b9cbd8a9ae68b32099fbb03b2d5ffa0c5e0dcc9 - Patch | |
| References | () https://git.kernel.org/stable/c/1e39b0486cdb496cdfba3bc89886150e46acf6f4 - Patch | |
| References | () https://git.kernel.org/stable/c/2fdac64c3c35858aa8ac5caa70b232e03456e120 - Patch | |
| References | () https://git.kernel.org/stable/c/465d01ef6962b82b1f0ad1f3e58b398dbd35c1c1 - Patch | |
| References | () https://git.kernel.org/stable/c/543e3e9f2e9e47ded774c74e680f28a0ca362aee - Patch | |
| References | () https://git.kernel.org/stable/c/8e2fcc68fbaab3ad9f5671fee2be0956134b740a - Patch | |
| References | () https://git.kernel.org/stable/c/f801e754efa21bd61b3cc15ec7565696165b272f - Patch | |
| CWE | CWE-416 | |
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 7.8  | 
| First Time | 
        
        Linux
         Linux linux Kernel  | 
|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 
13 Mar 2025, 13:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
|
| Summary | 
        
        
  | 
06 Mar 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-06 16:15
Updated : 2025-11-03 20:17
NVD link : CVE-2024-58072
Mitre link : CVE-2024-58072
CVE.ORG link : CVE-2024-58072
JSON object : View
Products Affected
                linux
- linux_kernel
 
CWE
                
                    
                        
                        CWE-416
                        
            Use After Free
