In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: Fix array index mistake in rtw89stainfogetiter()
In rtw89stainfogetiter() 'status->hegi' is compared to array size. But then 'rate->hegi' is used as array index instead of 'status->hegi'. This can lead to go beyond array boundaries in case of 'rate->hegi' is not equal to 'status->he_gi' and is bigger than array size. Looks like "copy-paste" mistake.
Fix this mistake by replacing 'rate->hegi' with 'status->hegi'.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"243560542029618654311372780178876366013",
"304481900217710687285973060925556094402",
"234435223840660178706802459207356991944",
"326194712350965534027802646538656094005"
]
},
"target": {
"file": "drivers/net/wireless/realtek/rtw89/debug.c"
},
"signature_version": "v1",
"id": "CVE-2024-43842-6b067c57",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a2a095c08b95372d6d0c5819b77f071af5e75366"
}
]