
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-58072 affects the rtlwifi driver in the Linux kernel. The vulnerability was introduced by commit 2461c7d60f9f which added a global list of private data structures, and later commit 26634c4b1868 added functionality to manage this list. The issue stems from an unused checkbuddypriv function and associated data structures, where the private data is not properly removed from the list when probe fails (Kernel Git).
The vulnerability exists in the rtlwifi driver's handling of private data structures. A race condition can occur on the global list and its corruption during a second probe when the initial probe fails. The issue specifically involves an unused checkbuddypriv hook and associated structures where a lock for the list exists but is never used. When probe fails, the private data remains in the list, potentially leading to access of freed memory during subsequent probes (RedHat).
The vulnerability could result in accessing freed memory during device initialization when probing the PCI driver. However, the security impact is limited as only privileged users can trigger the vulnerability (RedHat).
To mitigate this issue, prevent the rtlwifi module from being loaded. This can be achieved by blacklisting the kernel module to prevent it from loading automatically (RedHat).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."