CVE-2024-43842

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/08/2024
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()<br /> <br /> In rtw89_sta_info_get_iter() &amp;#39;status-&gt;he_gi&amp;#39; is compared to array size.<br /> But then &amp;#39;rate-&gt;he_gi&amp;#39; is used as array index instead of &amp;#39;status-&gt;he_gi&amp;#39;.<br /> This can lead to go beyond array boundaries in case of &amp;#39;rate-&gt;he_gi&amp;#39; is<br /> not equal to &amp;#39;status-&gt;he_gi&amp;#39; and is bigger than array size. Looks like<br /> "copy-paste" mistake.<br /> <br /> Fix this mistake by replacing &amp;#39;rate-&gt;he_gi&amp;#39; with &amp;#39;status-&gt;he_gi&amp;#39;.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with SVACE.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.103 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.44 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.10.3 (excluding)