{"api_version":"1","generated_at":"2026-05-13T03:12:04+00:00","cve":"CVE-2024-43879","urls":{"html":"https://cve.report/CVE-2024-43879","api":"https://cve.report/api/cve/CVE-2024-43879.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-43879","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-43879"},"summary":{"title":"wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()\n\nCurrently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in\ncfg80211_calculate_bitrate_he(), leading to below warning:\n\nkernel: invalid HE MCS: bw:6, ru:6\nkernel: WARNING: CPU: 0 PID: 2312 at net/wireless/util.c:1501 cfg80211_calculate_bitrate_he+0x22b/0x270 [cfg80211]\n\nFix it by handling 2x996 RU allocation in the same way as 160 MHz bandwidth.","state":"PUBLISHED","assigner":"Linux","published_at":"2024-08-21 01:15:12","updated_at":"2026-05-12 12:17:08"},"problem_types":["NVD-CWE-noinfo"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"5.5","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"references":[{"url":"https://git.kernel.org/stable/c/16ad67e73309db0c20cc2a651992bd01c05e6b27","name":"https://git.kernel.org/stable/c/16ad67e73309db0c20cc2a651992bd01c05e6b27","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/b289ebb0516526cb4abae081b7ec29fd4fa1209d","name":"https://git.kernel.org/stable/c/b289ebb0516526cb4abae081b7ec29fd4fa1209d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/19eaf4f2f5a981f55a265242ada2bf92b0c742dd","name":"https://git.kernel.org/stable/c/19eaf4f2f5a981f55a265242ada2bf92b0c742dd","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/bcbd771cd5d68c0c52567556097d75f9fc4e7cd6","name":"https://git.kernel.org/stable/c/bcbd771cd5d68c0c52567556097d75f9fc4e7cd6","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/576c64622649f3ec07e97bac8fec8b8a2ef4d086","name":"https://git.kernel.org/stable/c/576c64622649f3ec07e97bac8fec8b8a2ef4d086","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/67b5f1054197e4f5553047759c15c1d67d4c8142","name":"https://git.kernel.org/stable/c/67b5f1054197e4f5553047759c15c1d67d4c8142","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html","name":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/45d20a1c54be4f3173862c7b950d4468447814c9","name":"https://git.kernel.org/stable/c/45d20a1c54be4f3173862c7b950d4468447814c9","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-355557.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-355557.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html","name":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/2e201b3d162c6c49417c438ffb30b58c9f85769f","name":"https://git.kernel.org/stable/c/2e201b3d162c6c49417c438ffb30b58c9f85769f","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-43879","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43879","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected c4cbaf7973a794839af080f13748335976cf3f3f 45d20a1c54be4f3173862c7b950d4468447814c9 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected c4cbaf7973a794839af080f13748335976cf3f3f b289ebb0516526cb4abae081b7ec29fd4fa1209d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected c4cbaf7973a794839af080f13748335976cf3f3f 2e201b3d162c6c49417c438ffb30b58c9f85769f git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected c4cbaf7973a794839af080f13748335976cf3f3f 576c64622649f3ec07e97bac8fec8b8a2ef4d086 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected c4cbaf7973a794839af080f13748335976cf3f3f 16ad67e73309db0c20cc2a651992bd01c05e6b27 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected c4cbaf7973a794839af080f13748335976cf3f3f 67b5f1054197e4f5553047759c15c1d67d4c8142 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected c4cbaf7973a794839af080f13748335976cf3f3f 19eaf4f2f5a981f55a265242ada2bf92b0c742dd git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected c4cbaf7973a794839af080f13748335976cf3f3f bcbd771cd5d68c0c52567556097d75f9fc4e7cd6 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 4.19","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 4.19 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 4.19.320 4.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.4.282 5.4.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.10.224 5.10.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.15.165 5.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.103 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.44 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.10.3 6.10.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.11 * original_commit_for_fix","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"RUGGEDCOM RST2428P","version":"unaffected * custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family","version":"unaffected * custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SCALANCE XCM-/XRM-/XCH-/XRH-300 family","version":"unaffected * custom","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","version":"affected * custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2024","cve_id":"43879","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2024-43879","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2024-09-10T16:05:54.386411Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2024-09-12T17:33:17.515Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2025-11-03T22:06:30.644Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"}],"title":"CVE Program Container"},{"affected":[{"defaultStatus":"unknown","product":"RUGGEDCOM RST2428P","vendor":"Siemens","versions":[{"lessThan":"*","status":"unaffected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XC-300/XR-300/XC-400/XR-500WG/XR-500 family","vendor":"Siemens","versions":[{"lessThan":"*","status":"unaffected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SCALANCE XCM-/XRM-/XCH-/XRH-300 family","vendor":"Siemens","versions":[{"lessThan":"*","status":"unaffected","version":"0","versionType":"custom"}]},{"defaultStatus":"unknown","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","vendor":"Siemens","versions":[{"lessThan":"*","status":"affected","version":"0","versionType":"custom"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T11:57:07.804Z","orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP"},"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-355557.html"}],"x_adpType":"supplier"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["net/wireless/util.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"45d20a1c54be4f3173862c7b950d4468447814c9","status":"affected","version":"c4cbaf7973a794839af080f13748335976cf3f3f","versionType":"git"},{"lessThan":"b289ebb0516526cb4abae081b7ec29fd4fa1209d","status":"affected","version":"c4cbaf7973a794839af080f13748335976cf3f3f","versionType":"git"},{"lessThan":"2e201b3d162c6c49417c438ffb30b58c9f85769f","status":"affected","version":"c4cbaf7973a794839af080f13748335976cf3f3f","versionType":"git"},{"lessThan":"576c64622649f3ec07e97bac8fec8b8a2ef4d086","status":"affected","version":"c4cbaf7973a794839af080f13748335976cf3f3f","versionType":"git"},{"lessThan":"16ad67e73309db0c20cc2a651992bd01c05e6b27","status":"affected","version":"c4cbaf7973a794839af080f13748335976cf3f3f","versionType":"git"},{"lessThan":"67b5f1054197e4f5553047759c15c1d67d4c8142","status":"affected","version":"c4cbaf7973a794839af080f13748335976cf3f3f","versionType":"git"},{"lessThan":"19eaf4f2f5a981f55a265242ada2bf92b0c742dd","status":"affected","version":"c4cbaf7973a794839af080f13748335976cf3f3f","versionType":"git"},{"lessThan":"bcbd771cd5d68c0c52567556097d75f9fc4e7cd6","status":"affected","version":"c4cbaf7973a794839af080f13748335976cf3f3f","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["net/wireless/util.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"4.19"},{"lessThan":"4.19","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"4.19.*","status":"unaffected","version":"4.19.320","versionType":"semver"},{"lessThanOrEqual":"5.4.*","status":"unaffected","version":"5.4.282","versionType":"semver"},{"lessThanOrEqual":"5.10.*","status":"unaffected","version":"5.10.224","versionType":"semver"},{"lessThanOrEqual":"5.15.*","status":"unaffected","version":"5.15.165","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.103","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.44","versionType":"semver"},{"lessThanOrEqual":"6.10.*","status":"unaffected","version":"6.10.3","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"6.11","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"4.19.320","versionStartIncluding":"4.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.4.282","versionStartIncluding":"4.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.10.224","versionStartIncluding":"4.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.165","versionStartIncluding":"4.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.103","versionStartIncluding":"4.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.44","versionStartIncluding":"4.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.10.3","versionStartIncluding":"4.19","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.11","versionStartIncluding":"4.19","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()\n\nCurrently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in\ncfg80211_calculate_bitrate_he(), leading to below warning:\n\nkernel: invalid HE MCS: bw:6, ru:6\nkernel: WARNING: CPU: 0 PID: 2312 at net/wireless/util.c:1501 cfg80211_calculate_bitrate_he+0x22b/0x270 [cfg80211]\n\nFix it by handling 2x996 RU allocation in the same way as 160 MHz bandwidth."}],"providerMetadata":{"dateUpdated":"2026-05-11T20:31:35.682Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/45d20a1c54be4f3173862c7b950d4468447814c9"},{"url":"https://git.kernel.org/stable/c/b289ebb0516526cb4abae081b7ec29fd4fa1209d"},{"url":"https://git.kernel.org/stable/c/2e201b3d162c6c49417c438ffb30b58c9f85769f"},{"url":"https://git.kernel.org/stable/c/576c64622649f3ec07e97bac8fec8b8a2ef4d086"},{"url":"https://git.kernel.org/stable/c/16ad67e73309db0c20cc2a651992bd01c05e6b27"},{"url":"https://git.kernel.org/stable/c/67b5f1054197e4f5553047759c15c1d67d4c8142"},{"url":"https://git.kernel.org/stable/c/19eaf4f2f5a981f55a265242ada2bf92b0c742dd"},{"url":"https://git.kernel.org/stable/c/bcbd771cd5d68c0c52567556097d75f9fc4e7cd6"}],"title":"wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2024-43879","datePublished":"2024-08-21T00:06:31.488Z","dateReserved":"2024-08-17T09:11:59.286Z","dateUpdated":"2026-05-12T11:57:07.804Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-08-21 01:15:12","lastModifiedDate":"2026-05-12 12:17:08","problem_types":["NVD-CWE-noinfo"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"4.19.320","matchCriteriaId":"E8BAB0DE-BD14-4697-AE2B-C241BA82016C"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.4.282","matchCriteriaId":"A8961D98-9ACF-4188-BA88-44038B14BC28"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.224","matchCriteriaId":"5CCEDF13-293D-4E64-B501-4409D0365AFE"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.165","matchCriteriaId":"B4E2B568-3171-41DE-B519-F2B1A3600D94"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.103","matchCriteriaId":"E45EAC72-8329-4F99-8276-86AF9BB3496A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.6.44","matchCriteriaId":"CC912330-6B41-4C6B-99AF-F3857FBACB6A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7","versionEndExcluding":"6.10.3","matchCriteriaId":"92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"43879","Ordinal":"1","Title":"wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate","CVE":"CVE-2024-43879","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"43879","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate_bitrate_he()\n\nCurrently NL80211_RATE_INFO_HE_RU_ALLOC_2x996 is not handled in\ncfg80211_calculate_bitrate_he(), leading to below warning:\n\nkernel: invalid HE MCS: bw:6, ru:6\nkernel: WARNING: CPU: 0 PID: 2312 at net/wireless/util.c:1501 cfg80211_calculate_bitrate_he+0x22b/0x270 [cfg80211]\n\nFix it by handling 2x996 RU allocation in the same way as 160 MHz bandwidth.","Type":"Description","Title":"wifi: cfg80211: handle 2x996 RU allocation in cfg80211_calculate"}]}}}