CVE-2024-50008

In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() Replace one-element array with a flexible-array member in `struct host_cmd_ds_802_11_scan_ext`. With this, fix the following warning: elo 16 17:51:58 surfacebook kernel: ------------[ cut here ]------------ elo 16 17:51:58 surfacebook kernel: memcpy: detected field-spanning write (size 243) of single field "ext_scan->tlv_buffer" at drivers/net/wireless/marvell/mwifiex/scan.c:2239 (size 1) elo 16 17:51:58 surfacebook kernel: WARNING: CPU: 0 PID: 498 at drivers/net/wireless/marvell/mwifiex/scan.c:2239 mwifiex_cmd_802_11_scan_ext+0x83/0x90 [mwifiex]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

08 Nov 2024, 16:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/b55c8848fdc81514ec047b2a0ec782ffe9ab5323 -
  • () https://git.kernel.org/stable/c/f9310a6704bf52e2493480edea896e1f9b795d40 -

07 Nov 2024, 19:26

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Linux linux Kernel
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/17199b69a84798efffc475040fbef44374ef1de1 - () https://git.kernel.org/stable/c/17199b69a84798efffc475040fbef44374ef1de1 - Patch
References () https://git.kernel.org/stable/c/1756918f51e9ab247a0f4782cc28853c2bb457c1 - () https://git.kernel.org/stable/c/1756918f51e9ab247a0f4782cc28853c2bb457c1 - Patch
References () https://git.kernel.org/stable/c/498365e52bebcbc36a93279fe7e9d6aec8479cee - () https://git.kernel.org/stable/c/498365e52bebcbc36a93279fe7e9d6aec8479cee - Patch
References () https://git.kernel.org/stable/c/71267bd4e8c752d7af6c6b96bb83984a6a95273d - () https://git.kernel.org/stable/c/71267bd4e8c752d7af6c6b96bb83984a6a95273d - Patch
References () https://git.kernel.org/stable/c/a3a12c30f9510f3753286fadbc6cdb7dad78c1d5 - () https://git.kernel.org/stable/c/a3a12c30f9510f3753286fadbc6cdb7dad78c1d5 - Patch
References () https://git.kernel.org/stable/c/e59bdb1ba594104cd0ee0af3ee9e4435d842a8fe - () https://git.kernel.org/stable/c/e59bdb1ba594104cd0ee0af3ee9e4435d842a8fe - Patch
References () https://git.kernel.org/stable/c/fef7b51f22cf2049b0ca6740adeb0ba6f2e671dc - () https://git.kernel.org/stable/c/fef7b51f22cf2049b0ca6740adeb0ba6f2e671dc - Patch

23 Oct 2024, 15:13

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mwifiex: Se corrige la advertencia de escritura que abarca el campo memcpy() en mwifiex_cmd_802_11_scan_ext() Reemplazar la matriz de un elemento con un miembro de matriz flexible en `struct host_cmd_ds_802_11_scan_ext`. Con esto, se soluciona la siguiente advertencia: elo 16 17:51:58 kernel de surfacebook: ------------[ cortar aquí ]------------ elo 16 17:51:58 kernel de surfacebook: memcpy: se detectó escritura que abarca el campo (tamaño 243) de un solo campo "ext_scan->tlv_buffer" en drivers/net/wireless/marvell/mwifiex/scan.c:2239 (tamaño 1) elo 16 17:51:58 kernel de surfacebook: ADVERTENCIA: CPU: 0 PID: 498 en drivers/net/wireless/marvell/mwifiex/scan.c:2239 mwifiex_cmd_802_11_scan_ext+0x83/0x90 [mwifiex]

21 Oct 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 19:15

Updated : 2024-11-08 16:15


NVD link : CVE-2024-50008

Mitre link : CVE-2024-50008

CVE.ORG link : CVE-2024-50008


JSON object : View

Products Affected

linux

  • linux_kernel