Skip to main content

CVE-2024-43842: Vulnerability in Linux Linux

High
VulnerabilityCVE-2024-43842cvecve-2024-43842
Published: Sat Aug 17 2024 (08/17/2024, 09:21:57 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() In rtw89_sta_info_get_iter() 'status->he_gi' is compared to array size. But then 'rate->he_gi' is used as array index instead of 'status->he_gi'. This can lead to go beyond array boundaries in case of 'rate->he_gi' is not equal to 'status->he_gi' and is bigger than array size. Looks like "copy-paste" mistake. Fix this mistake by replacing 'rate->he_gi' with 'status->he_gi'. Found by Linux Verification Center (linuxtesting.org) with SVACE.

AI-Powered Analysis

AILast updated: 06/29/2025, 07:39:48 UTC

Technical Analysis

CVE-2024-43842 is a vulnerability identified in the Linux kernel's WiFi driver component rtw89, specifically within the function rtw89_sta_info_get_iter(). The flaw arises from an incorrect array index usage due to a programming error. The function compares the variable 'status->he_gi' against the array size to ensure bounds safety, but subsequently uses 'rate->he_gi' as the array index instead of 'status->he_gi'. If 'rate->he_gi' differs from 'status->he_gi' and exceeds the array boundary, this leads to an out-of-bounds array access. This is a classic off-by-one or indexing error likely introduced by a copy-paste mistake. Such an out-of-bounds access can cause undefined behavior including memory corruption, potential kernel crashes (denial of service), or in some cases, could be leveraged for privilege escalation or arbitrary code execution if exploited carefully. The vulnerability was discovered by the Linux Verification Center using static analysis tools (SVACE) and has been patched by correcting the index to use 'status->he_gi' consistently. The affected component is the rtw89 WiFi driver, which supports Realtek 8852AE and related chipsets. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.

Potential Impact

For European organizations, the impact of CVE-2024-43842 depends on the deployment of Linux systems using the affected rtw89 WiFi driver. Many enterprises and service providers in Europe rely on Linux-based infrastructure, including servers, embedded devices, and workstations. If these systems use affected Realtek WiFi chipsets with the vulnerable driver, attackers could potentially exploit this flaw to cause kernel crashes leading to denial of service or possibly escalate privileges to gain unauthorized control. This could disrupt critical services, especially in sectors like telecommunications, manufacturing, and government where Linux is prevalent. Additionally, embedded Linux devices in industrial control systems or IoT deployments could be impacted, raising concerns about operational continuity and safety. While no active exploitation is known, the vulnerability's presence in a widely used kernel component means that timely patching is essential to prevent future attacks. The confidentiality, integrity, and availability of affected systems could be compromised if exploited, with availability (denial of service) being the most immediate risk.

Mitigation Recommendations

To mitigate CVE-2024-43842, European organizations should: 1) Identify all Linux systems using the rtw89 WiFi driver, particularly those with Realtek 8852AE or similar chipsets. 2) Apply the latest Linux kernel patches or updates that fix this vulnerability as soon as they become available from trusted Linux distributions or kernel maintainers. 3) For embedded or IoT devices, coordinate with vendors to obtain firmware updates incorporating the fix. 4) Implement network segmentation and access controls to limit exposure of vulnerable devices to untrusted networks. 5) Monitor system logs and kernel crash reports for signs of exploitation attempts or abnormal behavior related to WiFi driver operations. 6) Employ kernel hardening features such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to reduce exploitation risk. 7) Maintain an inventory of affected hardware and software versions to ensure comprehensive coverage during patch management. These steps go beyond generic advice by focusing on driver-specific identification, vendor coordination, and proactive monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-08-17T09:11:59.274Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9828c4522896dcbe203e

Added to database: 5/21/2025, 9:08:56 AM

Last enriched: 6/29/2025, 7:39:48 AM

Last updated: 8/18/2025, 9:33:05 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats