Skip to main content

CVE-2024-50008: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-50008cvecve-2024-50008
Published: Mon Oct 21 2024 (10/21/2024, 18:54:01 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext() Replace one-element array with a flexible-array member in `struct host_cmd_ds_802_11_scan_ext`. With this, fix the following warning: elo 16 17:51:58 surfacebook kernel: ------------[ cut here ]------------ elo 16 17:51:58 surfacebook kernel: memcpy: detected field-spanning write (size 243) of single field "ext_scan->tlv_buffer" at drivers/net/wireless/marvell/mwifiex/scan.c:2239 (size 1) elo 16 17:51:58 surfacebook kernel: WARNING: CPU: 0 PID: 498 at drivers/net/wireless/marvell/mwifiex/scan.c:2239 mwifiex_cmd_802_11_scan_ext+0x83/0x90 [mwifiex]

AI-Powered Analysis

AILast updated: 06/28/2025, 16:11:29 UTC

Technical Analysis

CVE-2024-50008 is a vulnerability identified in the Linux kernel specifically within the mwifiex wireless driver, which supports Marvell Wi-Fi chipsets. The issue arises from improper handling of a memcpy() operation in the function mwifiex_cmd_802_11_scan_ext(), where a field-spanning write warning was detected. The root cause is the use of a one-element array in the struct host_cmd_ds_802_11_scan_ext, which was replaced with a flexible-array member to correctly handle variable-length data. This fix addresses a memcpy() call that previously attempted to write 243 bytes into a single field of size 1, causing a field-spanning write that could lead to memory corruption or undefined behavior. Although no known exploits are currently reported in the wild, the vulnerability could potentially be triggered by crafted wireless scan commands or malformed data processed by the driver. The issue is located in the wireless driver code for Marvell chipsets, which is part of the Linux kernel's network subsystem. The vulnerability affects specific Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, indicating a particular code state before the fix was applied. Since the vulnerability involves kernel-level code, exploitation could lead to privilege escalation, denial of service, or system instability if an attacker can induce the vulnerable memcpy operation. However, exploitation would likely require local access or the ability to influence wireless scanning operations at the kernel driver level.

Potential Impact

For European organizations, the impact of CVE-2024-50008 depends largely on the deployment of Linux systems using affected kernel versions with Marvell wireless chipsets. Many enterprises and service providers in Europe rely on Linux-based infrastructure, including servers, embedded devices, and endpoint systems. If exploited, this vulnerability could allow attackers to cause kernel crashes (denial of service) or potentially execute arbitrary code with kernel privileges, leading to full system compromise. This is particularly concerning for critical infrastructure sectors such as telecommunications, manufacturing, and government agencies that use Linux-based wireless networking components. The vulnerability's exploitation could disrupt wireless connectivity or be leveraged as a foothold for lateral movement within networks. However, the requirement for specific hardware and the absence of known exploits reduce the immediate risk. Nonetheless, organizations with Linux devices using Marvell Wi-Fi chipsets should consider this a significant security concern due to the kernel-level nature of the flaw and the potential for serious impact on confidentiality, integrity, and availability.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the fix for CVE-2024-50008. This involves applying the patch that replaces the one-element array with a flexible-array member in the host_cmd_ds_802_11_scan_ext structure, eliminating the unsafe memcpy operation. System administrators should audit their environments to identify devices running affected kernel versions and verify the presence of Marvell mwifiex wireless drivers. For embedded or specialized devices, coordinate with vendors to obtain updated firmware or kernel patches. Additionally, organizations should implement strict access controls to limit local user privileges, reducing the risk of exploitation by unprivileged users. Monitoring kernel logs for memcpy warnings or unusual wireless scanning behavior can help detect attempted exploitation. Network segmentation and wireless network security best practices should be enforced to minimize exposure. Finally, maintain an up-to-date inventory of hardware and software to quickly respond to similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-10-21T12:17:06.060Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9824c4522896dcbdfc9a

Added to database: 5/21/2025, 9:08:52 AM

Last enriched: 6/28/2025, 4:11:29 PM

Last updated: 7/29/2025, 10:45:26 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats