wifi: rtlwifi: remove unused check_buddy_priv
Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global
list of private data structures.
Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match
vendor version 2013.02.07") started adding the private data to that list at
probe time and added a hook, check_buddy_priv to find the private data from
a similar device.
However, that function was never used.
Besides, though there is a lock for that list, it is never used. And when
the probe fails, the private data is never removed from the list. This
would cause a second probe to access freed memory.
Remove the unused hook, structures and members, which will prevent the
potential race condition on the list and its corruption during a second
probe when probe fails.
Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
|  Debian DLA | DLA-4102-1 | linux-6.1 security update | 
|  Debian DLA | DLA-4178-1 | linux security update | 
|  EUVD | EUVD-2024-54028 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global list of private data structures. Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match vendor version 2013.02.07") started adding the private data to that list at probe time and added a hook, check_buddy_priv to find the private data from a similar device. However, that function was never used. Besides, though there is a lock for that list, it is never used. And when the probe fails, the private data is never removed from the list. This would cause a second probe to access freed memory. Remove the unused hook, structures and members, which will prevent the potential race condition on the list and its corruption during a second probe when probe fails. | 
|  Ubuntu USN | USN-7510-1 | Linux kernel vulnerabilities | 
|  Ubuntu USN | USN-7510-2 | Linux kernel (FIPS) vulnerabilities | 
|  Ubuntu USN | USN-7510-3 | Linux kernel vulnerabilities | 
|  Ubuntu USN | USN-7510-4 | Linux kernel (Real-time) vulnerabilities | 
|  Ubuntu USN | USN-7510-5 | Linux kernel (Azure FIPS) vulnerabilities | 
|  Ubuntu USN | USN-7510-6 | Linux kernel (AWS FIPS) vulnerabilities | 
|  Ubuntu USN | USN-7510-7 | Linux kernel vulnerabilities | 
|  Ubuntu USN | USN-7510-8 | Linux kernel (AWS) vulnerabilities | 
|  Ubuntu USN | USN-7511-1 | Linux kernel (GCP) vulnerabilities | 
|  Ubuntu USN | USN-7511-2 | Linux kernel (GCP FIPS) vulnerabilities | 
|  Ubuntu USN | USN-7511-3 | Linux kernel (GKE) vulnerabilities | 
|  Ubuntu USN | USN-7512-1 | Linux kernel (GCP) vulnerabilities | 
|  Ubuntu USN | USN-7516-1 | Linux kernel vulnerabilities | 
|  Ubuntu USN | USN-7516-2 | Linux kernel (GCP FIPS) vulnerabilities | 
|  Ubuntu USN | USN-7516-3 | Linux kernel vulnerabilities | 
|  Ubuntu USN | USN-7516-4 | Linux kernel (Oracle) vulnerabilities | 
|  Ubuntu USN | USN-7516-5 | Linux kernel (HWE) vulnerabilities | 
|  Ubuntu USN | USN-7516-6 | Linux kernel (IBM) vulnerabilities | 
|  Ubuntu USN | USN-7516-7 | Linux kernel (AWS) vulnerabilities | 
|  Ubuntu USN | USN-7516-8 | Linux kernel (FIPS) vulnerabilities | 
|  Ubuntu USN | USN-7516-9 | Linux kernel (AWS) vulnerabilities | 
|  Ubuntu USN | USN-7517-1 | Linux kernel (Xilinx ZynqMP) vulnerabilities | 
|  Ubuntu USN | USN-7517-2 | Linux kernel (IBM) vulnerabilities | 
|  Ubuntu USN | USN-7517-3 | Linux kernel (BlueField) vulnerabilities | 
|  Ubuntu USN | USN-7518-1 | Linux kernel (Azure FIPS) vulnerabilities | 
|  Ubuntu USN | USN-7521-1 | Linux kernel vulnerabilities | 
|  Ubuntu USN | USN-7521-2 | Linux kernel (AWS) vulnerabilities | 
|  Ubuntu USN | USN-7521-3 | Linux kernel vulnerabilities | 
|  Ubuntu USN | USN-7539-1 | Linux kernel (Raspberry Pi) vulnerabilities | 
|  Ubuntu USN | USN-7540-1 | Linux kernel (Raspberry Pi) vulnerabilities | 
|  Ubuntu USN | USN-7593-1 | Linux kernel (HWE) vulnerabilities | 
|  Ubuntu USN | USN-7602-1 | Linux kernel (Xilinx ZynqMP) vulnerabilities | 
|  Ubuntu USN | USN-7640-1 | Linux kernel (IoT) vulnerabilities | 
|  Ubuntu USN | USN-7651-1 | Linux kernel vulnerabilities | 
|  Ubuntu USN | USN-7651-2 | Linux kernel vulnerabilities | 
|  Ubuntu USN | USN-7651-3 | Linux kernel vulnerabilities | 
|  Ubuntu USN | USN-7651-4 | Linux kernel (GCP) vulnerabilities | 
|  Ubuntu USN | USN-7651-5 | Linux kernel (Raspberry Pi Real-time) vulnerabilities | 
|  Ubuntu USN | USN-7651-6 | Linux kernel (Raspberry Pi) vulnerabilities | 
|  Ubuntu USN | USN-7652-1 | Linux kernel (Real-time) vulnerabilities | 
|  Ubuntu USN | USN-7653-1 | Linux kernel (HWE) vulnerabilities | 
|  Ubuntu USN | USN-7737-1 | Linux kernel (Azure) vulnerabilities | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 30 Oct 2025 21:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| Metrics | cvssV3_1 
 | cvssV3_1 
 | 
Sat, 15 Mar 2025 03:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-416 | |
| Metrics | cvssV3_1 
 
 | cvssV3_1 
 
 | 
Thu, 13 Mar 2025 12:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Fri, 07 Mar 2025 02:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | |
| Metrics | threat_severity 
 | cvssV3_1 
 
 | 
Thu, 06 Mar 2025 16:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global list of private data structures. Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match vendor version 2013.02.07") started adding the private data to that list at probe time and added a hook, check_buddy_priv to find the private data from a similar device. However, that function was never used. Besides, though there is a lock for that list, it is never used. And when the probe fails, the private data is never removed from the list. This would cause a second probe to access freed memory. Remove the unused hook, structures and members, which will prevent the potential race condition on the list and its corruption during a second probe when probe fails. | |
| Title | wifi: rtlwifi: remove unused check_buddy_priv | |
| References |  | 
 | 
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T10:09:20.322Z
Reserved: 2025-03-06T15:52:09.182Z
Link: CVE-2024-58072
No data.
Status : Analyzed
Published: 2025-03-06T16:15:53.703
Modified: 2025-10-30T21:26:47.193
Link: CVE-2024-58072
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    Updated: 2025-07-12T22:23:22Z