In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: handle 2x996 RU allocation in cfg80211calculatebitrate_he()
Currently NL80211RATEINFOHERUALLOC2x996 is not handled in cfg80211calculatebitrate_he(), leading to below warning:
kernel: invalid HE MCS: bw:6, ru:6 kernel: WARNING: CPU: 0 PID: 2312 at net/wireless/util.c:1501 cfg80211calculatebitrate_he+0x22b/0x270 [cfg80211]
Fix it by handling 2x996 RU allocation in the same way as 160 MHz bandwidth.
[
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 2165.0,
"function_hash": "48136422381452429338020937756490675601"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@19eaf4f2f5a981f55a265242ada2bf92b0c742dd",
"target": {
"file": "net/wireless/util.c",
"function": "cfg80211_calculate_bitrate_he"
},
"id": "CVE-2024-43879-21e51ceb"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"58006388453038686532432845634681538535",
"287740777846546852540111890585948480983",
"223375155915621226388446100877834765846",
"218094067834201939676097653227729433380"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@19eaf4f2f5a981f55a265242ada2bf92b0c742dd",
"target": {
"file": "net/wireless/util.c"
},
"id": "CVE-2024-43879-44ae6a8c"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 2145.0,
"function_hash": "147917844578222201748705975715225620169"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2e201b3d162c6c49417c438ffb30b58c9f85769f",
"target": {
"file": "net/wireless/util.c",
"function": "cfg80211_calculate_bitrate_he"
},
"id": "CVE-2024-43879-56ea04eb"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 2165.0,
"function_hash": "48136422381452429338020937756490675601"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@576c64622649f3ec07e97bac8fec8b8a2ef4d086",
"target": {
"file": "net/wireless/util.c",
"function": "cfg80211_calculate_bitrate_he"
},
"id": "CVE-2024-43879-5cf42cdd"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 2165.0,
"function_hash": "48136422381452429338020937756490675601"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bcbd771cd5d68c0c52567556097d75f9fc4e7cd6",
"target": {
"file": "net/wireless/util.c",
"function": "cfg80211_calculate_bitrate_he"
},
"id": "CVE-2024-43879-5e2be199"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 2145.0,
"function_hash": "147917844578222201748705975715225620169"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b289ebb0516526cb4abae081b7ec29fd4fa1209d",
"target": {
"file": "net/wireless/util.c",
"function": "cfg80211_calculate_bitrate_he"
},
"id": "CVE-2024-43879-69933f34"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"58006388453038686532432845634681538535",
"287740777846546852540111890585948480983",
"223375155915621226388446100877834765846",
"218094067834201939676097653227729433380"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@bcbd771cd5d68c0c52567556097d75f9fc4e7cd6",
"target": {
"file": "net/wireless/util.c"
},
"id": "CVE-2024-43879-9fc2801a"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"58006388453038686532432845634681538535",
"287740777846546852540111890585948480983",
"223375155915621226388446100877834765846",
"218094067834201939676097653227729433380"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@16ad67e73309db0c20cc2a651992bd01c05e6b27",
"target": {
"file": "net/wireless/util.c"
},
"id": "CVE-2024-43879-b5f9214d"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 2165.0,
"function_hash": "48136422381452429338020937756490675601"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@16ad67e73309db0c20cc2a651992bd01c05e6b27",
"target": {
"file": "net/wireless/util.c",
"function": "cfg80211_calculate_bitrate_he"
},
"id": "CVE-2024-43879-d8f46112"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"58006388453038686532432845634681538535",
"287740777846546852540111890585948480983",
"223375155915621226388446100877834765846",
"218094067834201939676097653227729433380"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2e201b3d162c6c49417c438ffb30b58c9f85769f",
"target": {
"file": "net/wireless/util.c"
},
"id": "CVE-2024-43879-f1f56aa3"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"58006388453038686532432845634681538535",
"287740777846546852540111890585948480983",
"223375155915621226388446100877834765846",
"218094067834201939676097653227729433380"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@576c64622649f3ec07e97bac8fec8b8a2ef4d086",
"target": {
"file": "net/wireless/util.c"
},
"id": "CVE-2024-43879-f391cf04"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"58006388453038686532432845634681538535",
"287740777846546852540111890585948480983",
"223375155915621226388446100877834765846",
"218094067834201939676097653227729433380"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@b289ebb0516526cb4abae081b7ec29fd4fa1209d",
"target": {
"file": "net/wireless/util.c"
},
"id": "CVE-2024-43879-fa729c32"
}
]