CVE-2024-53059

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53059
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53059.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53059
Downstream
Related
Published
2024-11-19T18:15:25Z
Modified
2025-08-09T20:01:26Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: Fix response handling in iwlmvmsendrecoverycmd()

  1. The size of the response packet is not validated.
  2. The response buffer is not freed.

Resolve these issues by switching to iwlmvmsendcmdstatus(), which handles both size validation and frees the buffer.

References

Affected packages