Improper Validation of Array Index Affecting kernel-tools-libs package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-KERNELTOOLSLIBS-7760831
- published 21 Aug 2024
- disclosed 17 Aug 2024
Introduced: 17 Aug 2024
CVE-2024-43842 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:8
kernel-tools-libs
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-tools-libs
package and not the kernel-tools-libs
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()
In rtw89_sta_info_get_iter() 'status->he_gi' is compared to array size. But then 'rate->he_gi' is used as array index instead of 'status->he_gi'. This can lead to go beyond array boundaries in case of 'rate->he_gi' is not equal to 'status->he_gi' and is bigger than array size. Looks like "copy-paste" mistake.
Fix this mistake by replacing 'rate->he_gi' with 'status->he_gi'.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
- https://access.redhat.com/security/cve/CVE-2024-43842
- https://git.kernel.org/stable/c/7a0edc3d83aff3a48813d78c9cad9daf38decc74
- https://git.kernel.org/stable/c/85099c7ce4f9e64c66aa397cd9a37473637ab891
- https://git.kernel.org/stable/c/96ae4de5bc4c8ba39fd072369398f59495b73f58
- https://git.kernel.org/stable/c/a2a095c08b95372d6d0c5819b77f071af5e75366