
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-57997 affects the Linux kernel's wcn36xx WiFi driver. The vulnerability was discovered when KASAN reported a memory allocation issue in wcn->chan_survey due to incorrect size calculation. The issue was disclosed on February 26, 2025, and affects Linux kernel versions from 5.18 to 6.13.2 (NVD).
The vulnerability stems from an incorrect memory allocation size calculation in the wcn36xx WiFi driver. The issue occurs in the wcn36xxprobe function where wcn->chansurvey memory allocation was performed without accounting for the proper structure size. The vulnerability has been assigned a CVSS v3.1 base score of 5.5 (MEDIUM) with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability could lead to the use of uninitialized values when there are no frames on the channel, potentially causing system instability or crashes. The CVSS score indicates that while the vulnerability requires local access and low privileges, it can have a high impact on system availability (NVD).
The issue has been fixed by replacing devmkmalloc with devmkcalloc and properly calculating the allocation size using sizeof(struct wcn36xxchansurvey). The fix ensures proper initialization and prevents the use of uninitialized values. The patch has been merged into the Linux kernel (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."