
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-53059 affects the Linux kernel's iwlwifi driver, specifically in the response handling functionality of iwlmvmsendrecoverycmd(). The vulnerability was discovered on November 19, 2024, and affects Linux kernel versions from 5.1 through 6.1.116. The issue involves two main problems in the recovery command handling: the response packet size is not validated, and the response buffer is not properly freed (NVD).
The vulnerability exists in the iwlwifi driver's firmware recovery command handling mechanism. The issue stems from improper validation of response packet size and memory management in the iwlmvmsendrecoverycmd() function. The CVSS v3.1 base score is 7.8 (High), with a vector string of CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access requirements but high potential impact (NVD).
The vulnerability could potentially lead to memory corruption due to unvalidated response packet sizes and memory leaks from unreleased response buffers. This could affect system stability and potentially lead to privilege escalation or system crashes (NVD).
The issue has been resolved by switching to iwlmvmsendcmdstatus(), which properly handles both size validation and buffer freeing. The fix has been implemented in various kernel versions through patches. Multiple Linux distributions have released updates to address this vulnerability (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."