
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-50008 affects the Linux kernel's Marvell WiFi (mwifiex) driver, specifically in the mwifiex_cmd_802_11_scan_ext() function. The vulnerability was discovered and reported by Andy Shevchenko, with the initial disclosure on October 21, 2024. The issue affects multiple versions of the Linux kernel up to versions 5.10.227, 5.15.168, 6.1.113, 6.6.55, 6.10.14, and 6.11.3 (NVD).
The vulnerability involves a memcpy() field-spanning write warning in the mwifiex_cmd_802_11_scan_ext() function. The issue stems from a one-element array implementation in struct host_cmd_ds_802_11_scan_ext that caused field-spanning writes. The warning occurs when attempting to write 243 bytes to a single-byte field 'ext_scan->tlv_buffer' at drivers/net/wireless/marvell/mwifiex/scan.c:2239. The CVSS v3.1 base score is 5.5 (Medium), with vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (NVD).
The vulnerability could lead to a potential denial of service condition in affected systems. The CVSS scoring indicates that while there is no impact on confidentiality or integrity, there is a high impact on availability when successfully exploited (NVD).
The issue has been fixed by replacing the one-element array with a flexible-array member in struct host_cmd_ds_802_11_scan_ext. The fix has been implemented across various Linux kernel versions and distributions. Ubuntu has released patches for affected versions including 24.04 LTS, 22.04 LTS, and 20.04 LTS (Ubuntu).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."