First published: Thu Mar 06 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: fix memory leaks and invalid access at probe error path Deinitialize at reverse order when probe fails. When init_sw_vars fails, rtl_deinit_core should not be called, specially now that it destroys the rtl_wq workqueue. And call rtl_pci_deinit and deinit_sw_vars, otherwise, memory will be leaked. Remove pci_set_drvdata call as it will already be cleaned up by the core driver code and could lead to memory leaks too. cf. commit 8d450935ae7f ("wireless: rtlwifi: remove unnecessary pci_set_drvdata()") and commit 3d86b93064c7 ("rtlwifi: Fix PCI probe error path orphaned memory").
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=2.6.38<5.4.291 | |
Linux Kernel | >=5.5<5.10.235 | |
Linux Kernel | >=5.11<5.15.179 | |
Linux Kernel | >=5.16<6.1.129 | |
Linux Kernel | >=6.2<6.6.76 | |
Linux Kernel | >=6.7<6.12.13 | |
Linux Kernel | >=6.13<6.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-58063 has been classified as low severity due to its nature of memory leaks and invalid access that primarily affects system stability.
To mitigate CVE-2024-58063, ensure your Linux kernel is updated to the latest stable version where this vulnerability has been resolved.
CVE-2024-58063 affects Linux kernel versions utilized in various distributions that include rtlwifi drivers.
The impact of CVE-2024-58063 includes potential memory leaks and unstable behavior when the probe process fails.
CVE-2024-58063 is not considered remotely exploitable as it primarily affects internal memory management during driver initialization.