In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()
In rtw89_sta_info_get_iter() 'status->he_gi' is compared to array size.
But then 'rate->he_gi' is used as array index instead of 'status->he_gi'.
This can lead to go beyond array boundaries in case of 'rate->he_gi' is
not equal to 'status->he_gi' and is bigger than array size. Looks like
"copy-paste" mistake.
Fix this mistake by replacing 'rate->he_gi' with 'status->he_gi'.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
History
30 Sep 2024, 13:55
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | () https://git.kernel.org/stable/c/7a0edc3d83aff3a48813d78c9cad9daf38decc74 - Patch | |
References | () https://git.kernel.org/stable/c/85099c7ce4f9e64c66aa397cd9a37473637ab891 - Patch | |
References | () https://git.kernel.org/stable/c/96ae4de5bc4c8ba39fd072369398f59495b73f58 - Patch | |
References | () https://git.kernel.org/stable/c/a2a095c08b95372d6d0c5819b77f071af5e75366 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CWE | CWE-129 |
19 Aug 2024, 12:59
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
17 Aug 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-17 10:15
Updated : 2024-09-30 13:55
NVD link : CVE-2024-43842
Mitre link : CVE-2024-43842
CVE.ORG link : CVE-2024-43842
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index