{"vulnerability": "CVE-2024-56539", "sightings": [{"uuid": "79b8d59c-bf04-4bb3-b612-d9f60075340b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56539", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lec6msmdst2f", "content": "", "creation_timestamp": "2024-12-27T14:19:11.962370Z"}, {"uuid": "c6196c6e-5469-425c-a764-804acec272da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56539", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113725359559770444", "content": "", "creation_timestamp": "2024-12-27T14:54:32.950969Z"}, {"uuid": "ffe693c3-7b9a-4b6b-83fd-e3f86ba8c3d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56539", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "f0409f39-5668-4c0b-90c1-2fe4cead1f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-56539", "type": "seen", "source": "https://t.me/cvedetector/13749", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56539 - Marvell Mwifiex SSID Field Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-56539 \nPublished : Dec. 27, 2024, 2:15 p.m. | 42\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nwifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan()  \n  \nReplace one-element array with a flexible-array member in `struct  \nmwifiex_ie_types_wildcard_ssid_params` to fix the following warning  \non a MT8173 Chromebook (mt8173-elm-hana):  \n  \n[  356.775250] ------------[ cut here ]------------  \n[  356.784543] memcpy: detected field-spanning write (size 6) of single field \"wildcard_ssid_tlv-&gt;ssid\" at drivers/net/wireless/marvell/mwifiex/scan.c:904 (size 1)  \n[  356.813403] WARNING: CPU: 3 PID: 742 at drivers/net/wireless/marvell/mwifiex/scan.c:904 mwifiex_scan_networks+0x4fc/0xf28 [mwifiex]  \n  \nThe \"(size 6)\" above is exactly the length of the SSID of the network  \nthis device was connected to. The source of the warning looks like:  \n  \n    ssid_len = user_scan_in-&gt;ssid_list[i].ssid_len;  \n    [...]  \n    memcpy(wildcard_ssid_tlv-&gt;ssid,  \n           user_scan_in-&gt;ssid_list[i].ssid, ssid_len);  \n  \nThere is a #define WILDCARD_SSID_TLV_MAX_SIZE that uses sizeof() on this  \nstruct, but it already didn't account for the size of the one-element  \narray, so it doesn't need to be changed. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T15:59:56.000000Z"}]}