CVE-2024-43912

Source
https://cve.org/CVERecord?id=CVE-2024-43912
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43912.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-43912
Downstream
Related
Published
2024-08-26T10:11:16.868Z
Modified
2026-03-20T12:38:54.040185Z
Summary
wifi: nl80211: disallow setting special AP channel widths
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: disallow setting special AP channel widths

Setting the AP channel width is meant for use with the normal 20/40/... MHz channel width progression, and switching around in S1G or narrow channels isn't supported. Disallow that.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43912.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e16821bcfb364b0c41142db275dc74b39fa42c30
Fixed
3d42f2125f6c89e1e71c87b9f23412afddbba45e
Fixed
c6ea738e3feb407a3283197d9a25d0788f4f3cee
Fixed
ac3bf6e47fd8da9bfe8027e1acfe0282a91584fc
Fixed
23daf1b4c91db9b26f8425cc7039cf96d22ccbfe

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-43912.json"