CVE-2024-38616

Source
https://cve.org/CVERecord?id=CVE-2024-38616
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38616.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-38616
Downstream
Related
Published
2024-06-19T13:56:16.086Z
Modified
2026-03-23T05:06:07.571075904Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H CVSS Calculator
Summary
wifi: carl9170: re-fix fortified-memset warning
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: carl9170: re-fix fortified-memset warning

The carl9170txrelease() function sometimes triggers a fortified-memset warning in my randconfig builds:

In file included from include/linux/string.h:254, from drivers/net/wireless/ath/carl9170/tx.c:40: In function 'fortifymemsetchk', inlined from 'carl9170txrelease' at drivers/net/wireless/ath/carl9170/tx.c:283:2, inlined from 'krefput' at include/linux/kref.h:65:3, inlined from 'carl9170txputskb' at drivers/net/wireless/ath/carl9170/tx.c:342:9: include/linux/fortify-string.h:493:25: error: call to '__writeoverflowfield' declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning] 493 | __writeoverflowfield(psizefield, size);

Kees previously tried to avoid this by using memsetafter(), but it seems this does not fully address the problem. I noticed that the memsetafter() here is done on a different part of the union (status) than the original cast was from (ratedriverdata), which may confuse the compiler.

Unfortunately, the memsetafter() trick does not work on driverrates[] because that is part of an anonymous struct, and I could not get struct_group() to do this either. Using two separate memset() calls on the two members does address the warning though.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38616.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
fb5f6a0e8063b7a84d6d44ef353846ccd7708d2e
Fixed
13857683126e8a6492af73c74d702835f7a2175b
Fixed
87586467098281f04fa93e59fe3a516b954bddc4
Fixed
0c38c9c460bb8ce8d6f6cf316e0d71a70983ec83
Fixed
042a39bb8e0812466327a5102606e88a5a4f8c02
Fixed
066afafc10c9476ee36c47c9062527a17e763901

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38616.json"