CVE-2024-53059

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd() 1. The size of the response packet is not validated. 2. The response buffer is not freed. Resolve these issues by switching to iwl_mvm_send_cmd_status(), which handles both size validation and frees the buffer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*

History

03 Dec 2024, 20:57

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/07a6e3b78a65f4b2796a8d0d4adb1a15a81edead - () https://git.kernel.org/stable/c/07a6e3b78a65f4b2796a8d0d4adb1a15a81edead - Patch
References () https://git.kernel.org/stable/c/3eb986c64c6bfb721950f9666a3b723cf65d043f - () https://git.kernel.org/stable/c/3eb986c64c6bfb721950f9666a3b723cf65d043f - Patch
References () https://git.kernel.org/stable/c/3f45d590ccbae6dfd6faef54efe74c30bd85d3da - () https://git.kernel.org/stable/c/3f45d590ccbae6dfd6faef54efe74c30bd85d3da - Patch
References () https://git.kernel.org/stable/c/45a628911d3c68e024eed337054a0452b064f450 - () https://git.kernel.org/stable/c/45a628911d3c68e024eed337054a0452b064f450 - Patch
References () https://git.kernel.org/stable/c/64d63557ded6ff3ce72b18ab87a6c4b1b652161c - () https://git.kernel.org/stable/c/64d63557ded6ff3ce72b18ab87a6c4b1b652161c - Patch
References () https://git.kernel.org/stable/c/9480c3045f302f43f9910d2d556d6cf5a62c1822 - () https://git.kernel.org/stable/c/9480c3045f302f43f9910d2d556d6cf5a62c1822 - Patch
References () https://git.kernel.org/stable/c/9c98ee7ea463a838235e7a0e35851b38476364f2 - () https://git.kernel.org/stable/c/9c98ee7ea463a838235e7a0e35851b38476364f2 - Patch
CWE NVD-CWE-noinfo
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: Se ha corregido el manejo de respuestas en iwl_mvm_send_recovery_cmd() 1. No se valida el tamaño del paquete de respuesta. 2. No se libera el búfer de respuesta. Resuelva estos problemas cambiando a iwl_mvm_send_cmd_status(), que maneja tanto la validación del tamaño como la liberación del búfer.
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

19 Nov 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-19 18:15

Updated : 2024-12-03 20:57


NVD link : CVE-2024-53059

Mitre link : CVE-2024-53059

CVE.ORG link : CVE-2024-53059


JSON object : View

Products Affected

linux

  • linux_kernel