CVE-2024-53059

Source
https://cve.org/CVERecord?id=CVE-2024-53059
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53059.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-53059
Downstream
Related
Published
2024-11-19T17:19:41.546Z
Modified
2026-03-11T07:53:55.934167Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: Fix response handling in iwlmvmsendrecoverycmd()

  1. The size of the response packet is not validated.
  2. The response buffer is not freed.

Resolve these issues by switching to iwlmvmsendcmdstatus(), which handles both size validation and frees the buffer.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/53xxx/CVE-2024-53059.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f130bb75d8817c560b48c4d1a0e5279968a0859d
Fixed
9c98ee7ea463a838235e7a0e35851b38476364f2
Fixed
45a628911d3c68e024eed337054a0452b064f450
Fixed
3f45d590ccbae6dfd6faef54efe74c30bd85d3da
Fixed
64d63557ded6ff3ce72b18ab87a6c4b1b652161c
Fixed
3eb986c64c6bfb721950f9666a3b723cf65d043f
Fixed
9480c3045f302f43f9910d2d556d6cf5a62c1822
Fixed
07a6e3b78a65f4b2796a8d0d4adb1a15a81edead

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-53059.json"