5.5
MEDIUM
CVE-2024-53055
IBM Wi-Fi Kernal Buffer Overflow
Description

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix 6 GHz scan construction If more than 255 colocated APs exist for the set of all APs found during 2.4/5 GHz scanning, then the 6 GHz scan construction will loop forever since the loop variable has type u8, which can never reach the number found when that's bigger than 255, and is stored in a u32 variable. Also move it into the loops to have a smaller scope. Using a u32 there is fine, we limit the number of APs in the scan list and each has a limit on the number of RNR entries due to the frame size. With a limit of 1000 scan results, a frame size upper bound of 4096 (really it's more like ~2300) and a TBTT entry size of at least 11, we get an upper bound for the number of ~372k, well in the bounds of a u32.

INFO

Published Date :

Nov. 19, 2024, 6:15 p.m.

Last Modified :

Nov. 22, 2024, 5:18 p.m.

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Remotely Exploitable :

No

Impact Score :

3.6

Exploitability Score :

1.8
Affected Products

The following products are affected by CVE-2024-53055 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-53055 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2024-53055 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Nov. 22, 2024

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    Added CWE NIST CWE-835
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.171 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.116 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.60 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.11.7 *cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*
    Changed Reference Type https://git.kernel.org/stable/c/2ac15e5a8f42fed5d90ed9e1197600913678c50f No Types Assigned https://git.kernel.org/stable/c/2ac15e5a8f42fed5d90ed9e1197600913678c50f Patch
    Changed Reference Type https://git.kernel.org/stable/c/2ccd5badadab2d586e91546bf5af3deda07fef1f No Types Assigned https://git.kernel.org/stable/c/2ccd5badadab2d586e91546bf5af3deda07fef1f Patch
    Changed Reference Type https://git.kernel.org/stable/c/7245012f0f496162dd95d888ed2ceb5a35170f1a No Types Assigned https://git.kernel.org/stable/c/7245012f0f496162dd95d888ed2ceb5a35170f1a Patch
    Changed Reference Type https://git.kernel.org/stable/c/cde8a7eb5c6762264ff0f4433358e0a0d250c875 No Types Assigned https://git.kernel.org/stable/c/cde8a7eb5c6762264ff0f4433358e0a0d250c875 Patch
    Changed Reference Type https://git.kernel.org/stable/c/fc621e7a043de346c33bd7ae7e2e0c651d6152ef No Types Assigned https://git.kernel.org/stable/c/fc621e7a043de346c33bd7ae7e2e0c651d6152ef Patch
  • CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Nov. 19, 2024

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix 6 GHz scan construction If more than 255 colocated APs exist for the set of all APs found during 2.4/5 GHz scanning, then the 6 GHz scan construction will loop forever since the loop variable has type u8, which can never reach the number found when that's bigger than 255, and is stored in a u32 variable. Also move it into the loops to have a smaller scope. Using a u32 there is fine, we limit the number of APs in the scan list and each has a limit on the number of RNR entries due to the frame size. With a limit of 1000 scan results, a frame size upper bound of 4096 (really it's more like ~2300) and a TBTT entry size of at least 11, we get an upper bound for the number of ~372k, well in the bounds of a u32.
    Added Reference kernel.org https://git.kernel.org/stable/c/2ac15e5a8f42fed5d90ed9e1197600913678c50f [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/cde8a7eb5c6762264ff0f4433358e0a0d250c875 [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/fc621e7a043de346c33bd7ae7e2e0c651d6152ef [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/2ccd5badadab2d586e91546bf5af3deda07fef1f [No types assigned]
    Added Reference kernel.org https://git.kernel.org/stable/c/7245012f0f496162dd95d888ed2ceb5a35170f1a [No types assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-53055 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-53055 weaknesses.

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability