CVE-2024-43842: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() In rtw89_sta_info_get_iter() 'status->he_gi' is compared to array size. But then 'rate->he_gi' is used as array index instead of 'status->he_gi'. This can lead to go beyond array boundaries in case of 'rate->he_gi' is not equal to 'status->he_gi' and is bigger than array size. Looks like "copy-paste" mistake. Fix this mistake by replacing 'rate->he_gi' with 'status->he_gi'. Found by Linux Verification Center (linuxtesting.org) with SVACE.
AI Analysis
Technical Summary
CVE-2024-43842 is a vulnerability identified in the Linux kernel's WiFi driver component rtw89, specifically within the function rtw89_sta_info_get_iter(). The flaw arises from an incorrect array index usage due to a programming error. The function compares the variable 'status->he_gi' against the array size to ensure bounds safety, but subsequently uses 'rate->he_gi' as the array index instead of 'status->he_gi'. If 'rate->he_gi' differs from 'status->he_gi' and exceeds the array boundary, this leads to an out-of-bounds array access. This is a classic off-by-one or indexing error likely introduced by a copy-paste mistake. Such an out-of-bounds access can cause undefined behavior including memory corruption, potential kernel crashes (denial of service), or in some cases, could be leveraged for privilege escalation or arbitrary code execution if exploited carefully. The vulnerability was discovered by the Linux Verification Center using static analysis tools (SVACE) and has been patched by correcting the index to use 'status->he_gi' consistently. The affected component is the rtw89 WiFi driver, which supports Realtek 8852AE and related chipsets. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2024-43842 depends on the deployment of Linux systems using the affected rtw89 WiFi driver. Many enterprises and service providers in Europe rely on Linux-based infrastructure, including servers, embedded devices, and workstations. If these systems use affected Realtek WiFi chipsets with the vulnerable driver, attackers could potentially exploit this flaw to cause kernel crashes leading to denial of service or possibly escalate privileges to gain unauthorized control. This could disrupt critical services, especially in sectors like telecommunications, manufacturing, and government where Linux is prevalent. Additionally, embedded Linux devices in industrial control systems or IoT deployments could be impacted, raising concerns about operational continuity and safety. While no active exploitation is known, the vulnerability's presence in a widely used kernel component means that timely patching is essential to prevent future attacks. The confidentiality, integrity, and availability of affected systems could be compromised if exploited, with availability (denial of service) being the most immediate risk.
Mitigation Recommendations
To mitigate CVE-2024-43842, European organizations should: 1) Identify all Linux systems using the rtw89 WiFi driver, particularly those with Realtek 8852AE or similar chipsets. 2) Apply the latest Linux kernel patches or updates that fix this vulnerability as soon as they become available from trusted Linux distributions or kernel maintainers. 3) For embedded or IoT devices, coordinate with vendors to obtain firmware updates incorporating the fix. 4) Implement network segmentation and access controls to limit exposure of vulnerable devices to untrusted networks. 5) Monitor system logs and kernel crash reports for signs of exploitation attempts or abnormal behavior related to WiFi driver operations. 6) Employ kernel hardening features such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to reduce exploitation risk. 7) Maintain an inventory of affected hardware and software versions to ensure comprehensive coverage during patch management. These steps go beyond generic advice by focusing on driver-specific identification, vendor coordination, and proactive monitoring.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-2024-43842: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter() In rtw89_sta_info_get_iter() 'status->he_gi' is compared to array size. But then 'rate->he_gi' is used as array index instead of 'status->he_gi'. This can lead to go beyond array boundaries in case of 'rate->he_gi' is not equal to 'status->he_gi' and is bigger than array size. Looks like "copy-paste" mistake. Fix this mistake by replacing 'rate->he_gi' with 'status->he_gi'. Found by Linux Verification Center (linuxtesting.org) with SVACE.
AI-Powered Analysis
Technical Analysis
CVE-2024-43842 is a vulnerability identified in the Linux kernel's WiFi driver component rtw89, specifically within the function rtw89_sta_info_get_iter(). The flaw arises from an incorrect array index usage due to a programming error. The function compares the variable 'status->he_gi' against the array size to ensure bounds safety, but subsequently uses 'rate->he_gi' as the array index instead of 'status->he_gi'. If 'rate->he_gi' differs from 'status->he_gi' and exceeds the array boundary, this leads to an out-of-bounds array access. This is a classic off-by-one or indexing error likely introduced by a copy-paste mistake. Such an out-of-bounds access can cause undefined behavior including memory corruption, potential kernel crashes (denial of service), or in some cases, could be leveraged for privilege escalation or arbitrary code execution if exploited carefully. The vulnerability was discovered by the Linux Verification Center using static analysis tools (SVACE) and has been patched by correcting the index to use 'status->he_gi' consistently. The affected component is the rtw89 WiFi driver, which supports Realtek 8852AE and related chipsets. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations, the impact of CVE-2024-43842 depends on the deployment of Linux systems using the affected rtw89 WiFi driver. Many enterprises and service providers in Europe rely on Linux-based infrastructure, including servers, embedded devices, and workstations. If these systems use affected Realtek WiFi chipsets with the vulnerable driver, attackers could potentially exploit this flaw to cause kernel crashes leading to denial of service or possibly escalate privileges to gain unauthorized control. This could disrupt critical services, especially in sectors like telecommunications, manufacturing, and government where Linux is prevalent. Additionally, embedded Linux devices in industrial control systems or IoT deployments could be impacted, raising concerns about operational continuity and safety. While no active exploitation is known, the vulnerability's presence in a widely used kernel component means that timely patching is essential to prevent future attacks. The confidentiality, integrity, and availability of affected systems could be compromised if exploited, with availability (denial of service) being the most immediate risk.
Mitigation Recommendations
To mitigate CVE-2024-43842, European organizations should: 1) Identify all Linux systems using the rtw89 WiFi driver, particularly those with Realtek 8852AE or similar chipsets. 2) Apply the latest Linux kernel patches or updates that fix this vulnerability as soon as they become available from trusted Linux distributions or kernel maintainers. 3) For embedded or IoT devices, coordinate with vendors to obtain firmware updates incorporating the fix. 4) Implement network segmentation and access controls to limit exposure of vulnerable devices to untrusted networks. 5) Monitor system logs and kernel crash reports for signs of exploitation attempts or abnormal behavior related to WiFi driver operations. 6) Employ kernel hardening features such as Kernel Address Space Layout Randomization (KASLR) and Kernel Page Table Isolation (KPTI) to reduce exploitation risk. 7) Maintain an inventory of affected hardware and software versions to ensure comprehensive coverage during patch management. These steps go beyond generic advice by focusing on driver-specific identification, vendor coordination, and proactive monitoring.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-08-17T09:11:59.274Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9828c4522896dcbe203e
Added to database: 5/21/2025, 9:08:56 AM
Last enriched: 6/29/2025, 7:39:48 AM
Last updated: 8/18/2025, 9:33:05 AM
Views: 18
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.