In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw89: Fix array index mistake in rtw89_sta_info_get_iter()
In rtw89_sta_info_get_iter() ‘status->he_gi’ is compared to array size.
But then ‘rate->he_gi’ is used as array index instead of ‘status->he_gi’.
This can lead to go beyond array boundaries in case of ‘rate->he_gi’ is
not equal to ‘status->he_gi’ and is bigger than array size. Looks like
“copy-paste” mistake.
Fix this mistake by replacing ‘rate->he_gi’ with ‘status->he_gi’.
Found by Linux Verification Center (linuxtesting.org) with SVACE.
git.kernel.org/stable/c/7a0edc3d83aff3a48813d78c9cad9daf38decc74
git.kernel.org/stable/c/85099c7ce4f9e64c66aa397cd9a37473637ab891
git.kernel.org/stable/c/96ae4de5bc4c8ba39fd072369398f59495b73f58
git.kernel.org/stable/c/a2a095c08b95372d6d0c5819b77f071af5e75366
security-tracker.debian.org/tracker/CVE-2024-43842