Improper Validation of Array Index Affecting dlm-kmp-default package, versions <6.4.0-150600.23.22.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES156-DLMKMPDEFAULT-8080266
- published 24 Sep 2024
- disclosed 23 Sep 2024
Introduced: 23 Sep 2024
CVE-2024-43842 Open this link in a new tabHow to fix?
Upgrade SLES:15.6
dlm-kmp-default
to version 6.4.0-150600.23.22.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream dlm-kmp-default
package and not the dlm-kmp-default
package as distributed by SLES
.
See How to fix?
for SLES:15.6
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()
In rtw89_sta_info_get_iter() 'status->he_gi' is compared to array size. But then 'rate->he_gi' is used as array index instead of 'status->he_gi'. This can lead to go beyond array boundaries in case of 'rate->he_gi' is not equal to 'status->he_gi' and is bigger than array size. Looks like "copy-paste" mistake.
Fix this mistake by replacing 'rate->he_gi' with 'status->he_gi'.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
References
- https://www.suse.com/security/cve/CVE-2024-43842.html
- https://bugzilla.suse.com/1229317
- https://git.kernel.org/stable/c/7a0edc3d83aff3a48813d78c9cad9daf38decc74
- https://git.kernel.org/stable/c/85099c7ce4f9e64c66aa397cd9a37473637ab891
- https://git.kernel.org/stable/c/96ae4de5bc4c8ba39fd072369398f59495b73f58
- https://git.kernel.org/stable/c/a2a095c08b95372d6d0c5819b77f071af5e75366