
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-56539 affects the Linux kernel's Marvell WiFi driver (mwifiex). The vulnerability was discovered in December 2024 and involves a field-spanning write warning in the mwifiexconfigscan() function. The issue specifically affects the Marvell WiFi chip driver's handling of SSID parameters during network scanning operations (NVD).
The vulnerability stems from a memcpy() field-spanning write warning in the mwifiexconfigscan() function. The issue occurs when copying SSID data in the struct mwifiexietypeswildcardssid_params, where a one-element array implementation caused buffer overflow warnings. The problem manifests when the SSID length of the connected network exceeds the allocated buffer size, triggering warnings on systems like the MT8173 Chromebook (Kernel Commit).
The vulnerability affects the Linux kernel's wireless networking functionality, specifically in systems using Marvell WiFi chips. While primarily causing warning messages during network scanning operations, it represents a potential memory safety issue that could affect system stability (NVD).
The issue has been resolved by replacing the one-element array with a flexible-array member in the struct mwifiexietypeswildcardssid_params. The fix has been implemented in various Linux kernel versions, including version 6.1.6.1.128-1~deb11u1 for Debian 11 (Debian Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."