In the Linux kernel, the following vulnerability has been resolved:
wifi: nl80211: disallow setting special AP channel widths
Setting the AP channel width is meant for use with the normal 20/40/... MHz channel width progression, and switching around in S1G or narrow channels isn't supported. Disallow that.
[
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 1260.0,
"function_hash": "125075557525803896770172859588755583749"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3d42f2125f6c89e1e71c87b9f23412afddbba45e",
"target": {
"file": "net/wireless/nl80211.c",
"function": "__nl80211_set_channel"
},
"id": "CVE-2024-43912-1d6affda"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"83627494659939066546883285903643153575",
"271913333251262275746403579455683636380",
"312688825594086916055923120399605808038"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3d42f2125f6c89e1e71c87b9f23412afddbba45e",
"target": {
"file": "net/wireless/nl80211.c"
},
"id": "CVE-2024-43912-2b9bc6ab"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 1260.0,
"function_hash": "125075557525803896770172859588755583749"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c6ea738e3feb407a3283197d9a25d0788f4f3cee",
"target": {
"file": "net/wireless/nl80211.c",
"function": "__nl80211_set_channel"
},
"id": "CVE-2024-43912-6afd012f"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"83627494659939066546883285903643153575",
"271913333251262275746403579455683636380",
"312688825594086916055923120399605808038"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@c6ea738e3feb407a3283197d9a25d0788f4f3cee",
"target": {
"file": "net/wireless/nl80211.c"
},
"id": "CVE-2024-43912-829337ea"
},
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"83627494659939066546883285903643153575",
"271913333251262275746403579455683636380",
"312688825594086916055923120399605808038"
],
"threshold": 0.9
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ac3bf6e47fd8da9bfe8027e1acfe0282a91584fc",
"target": {
"file": "net/wireless/nl80211.c"
},
"id": "CVE-2024-43912-9ef78e30"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 1292.0,
"function_hash": "2042903764890691911389503331823211026"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ac3bf6e47fd8da9bfe8027e1acfe0282a91584fc",
"target": {
"file": "net/wireless/nl80211.c",
"function": "__nl80211_set_channel"
},
"id": "CVE-2024-43912-e6777f1a"
}
]