Логотип exploitDog
bind:CVE-2024-58072
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-58072

Количество 17

Количество 17

ubuntu логотип

CVE-2024-58072

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global list of private data structures. Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match vendor version 2013.02.07") started adding the private data to that list at probe time and added a hook, check_buddy_priv to find the private data from a similar device. However, that function was never used. Besides, though there is a lock for that list, it is never used. And when the probe fails, the private data is never removed from the list. This would cause a second probe to access freed memory. Remove the unused hook, structures and members, which will prevent the potential race condition on the list and its corruption during a second probe when probe fails.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2024-58072

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global list of private data structures. Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match vendor version 2013.02.07") started adding the private data to that list at probe time and added a hook, check_buddy_priv to find the private data from a similar device. However, that function was never used. Besides, though there is a lock for that list, it is never used. And when the probe fails, the private data is never removed from the list. This would cause a second probe to access freed memory. Remove the unused hook, structures and members, which will prevent the potential race condition on the list and its corruption during a second probe when probe fails.

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2024-58072

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global list of private data structures. Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match vendor version 2013.02.07") started adding the private data to that list at probe time and added a hook, check_buddy_priv to find the private data from a similar device. However, that function was never used. Besides, though there is a lock for that list, it is never used. And when the probe fails, the private data is never removed from the list. This would cause a second probe to access freed memory. Remove the unused hook, structures and members, which will prevent the potential race condition on the list and its corruption during a second probe when probe fails.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2024-58072

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: w ...

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-pjpx-9xrf-qmh6

10 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global list of private data structures. Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match vendor version 2013.02.07") started adding the private data to that list at probe time and added a hook, check_buddy_priv to find the private data from a similar device. However, that function was never used. Besides, though there is a lock for that list, it is never used. And when the probe fails, the private data is never removed from the list. This would cause a second probe to access freed memory. Remove the unused hook, structures and members, which will prevent the potential race condition on the list and its corruption during a second probe when probe fails.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-12102

около 1 года назад

Уязвимость компонентов realtek/rtlwifi операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
oracle-oval логотип

ELSA-2025-20095-0

24 дня назад

ELSA-2025-20095-0: kernel security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2025:20095

22 дня назад

Moderate: kernel security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20518-0

около 1 месяца назад

ELSA-2025-20518-0: kernel security update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2025:20518

28 дней назад

Moderate: kernel security update

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1177-1

8 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1180-1

8 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1178-1

8 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1293-1

8 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01919-1

6 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20530

4 месяца назад

ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20480

5 месяцев назад

ELSA-2025-20480: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-58072

In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global list of private data structures. Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match vendor version 2013.02.07") started adding the private data to that list at probe time and added a hook, check_buddy_priv to find the private data from a similar device. However, that function was never used. Besides, though there is a lock for that list, it is never used. And when the probe fails, the private data is never removed from the list. This would cause a second probe to access freed memory. Remove the unused hook, structures and members, which will prevent the potential race condition on the list and its corruption during a second probe when probe fails.

CVSS3: 7.8
0%
Низкий
10 месяцев назад
redhat логотип
CVE-2024-58072

In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global list of private data structures. Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match vendor version 2013.02.07") started adding the private data to that list at probe time and added a hook, check_buddy_priv to find the private data from a similar device. However, that function was never used. Besides, though there is a lock for that list, it is never used. And when the probe fails, the private data is never removed from the list. This would cause a second probe to access freed memory. Remove the unused hook, structures and members, which will prevent the potential race condition on the list and its corruption during a second probe when probe fails.

CVSS3: 6.4
0%
Низкий
10 месяцев назад
nvd логотип
CVE-2024-58072

In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global list of private data structures. Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match vendor version 2013.02.07") started adding the private data to that list at probe time and added a hook, check_buddy_priv to find the private data from a similar device. However, that function was never used. Besides, though there is a lock for that list, it is never used. And when the probe fails, the private data is never removed from the list. This would cause a second probe to access freed memory. Remove the unused hook, structures and members, which will prevent the potential race condition on the list and its corruption during a second probe when probe fails.

CVSS3: 7.8
0%
Низкий
10 месяцев назад
debian логотип
CVE-2024-58072

In the Linux kernel, the following vulnerability has been resolved: w ...

CVSS3: 7.8
0%
Низкий
10 месяцев назад
github логотип
GHSA-pjpx-9xrf-qmh6

In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global list of private data structures. Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match vendor version 2013.02.07") started adding the private data to that list at probe time and added a hook, check_buddy_priv to find the private data from a similar device. However, that function was never used. Besides, though there is a lock for that list, it is never used. And when the probe fails, the private data is never removed from the list. This would cause a second probe to access freed memory. Remove the unused hook, structures and members, which will prevent the potential race condition on the list and its corruption during a second probe when probe fails.

CVSS3: 7.8
0%
Низкий
10 месяцев назад
fstec логотип
BDU:2025-12102

Уязвимость компонентов realtek/rtlwifi операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2025-20095-0

ELSA-2025-20095-0: kernel security update (MODERATE)

24 дня назад
rocky логотип
RLSA-2025:20095

Moderate: kernel security update

22 дня назад
oracle-oval логотип
ELSA-2025-20518-0

ELSA-2025-20518-0: kernel security update (MODERATE)

около 1 месяца назад
rocky логотип
RLSA-2025:20518

Moderate: kernel security update

28 дней назад
suse-cvrf логотип
SUSE-SU-2025:1177-1

Security update for the Linux Kernel

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1180-1

Security update for the Linux Kernel

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1178-1

Security update for the Linux Kernel

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1293-1

Security update for the Linux Kernel

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:01919-1

Security update for the Linux Kernel

6 месяцев назад
oracle-oval логотип
ELSA-2025-20530

ELSA-2025-20530: Unbreakable Enterprise kernel security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-20480

ELSA-2025-20480: Unbreakable Enterprise kernel security update (IMPORTANT)

5 месяцев назад

Уязвимостей на страницу