In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: improve CSA/ECSA connection refusal
As mentioned in the previous commit, we pretty quickly found
that some APs have ECSA elements stuck in their probe response,
so using that to not attempt to connect while CSA is happening
we never connect to such an AP.
Improve this situation by checking more carefully and ignoring
the ECSA if cfg80211 has previously detected the ECSA element
being stuck in the probe response.
Additionally, allow connecting to an AP that's switching to a
channel it's already using, unless it's using quiet mode. In
this case, we may just have to adjust bandwidth later. If it's
actually switching channels, it's better not to try to connect
in the middle of that.
References
Configurations
Configuration 1 (hide)
|
History
17 Mar 2025, 15:41
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/35e2385dbe787936c793d70755a5177d267a40aa - Patch | |
References | () https://git.kernel.org/stable/c/ea88bde8e3fefbe4268f6991375dd629895a090a - Patch | |
CWE | NVD-CWE-noinfo |
Information
Published : 2024-04-02 07:15
Updated : 2025-03-17 15:41
NVD link : CVE-2024-26682
Mitre link : CVE-2024-26682
CVE.ORG link : CVE-2024-26682
JSON object : View
Products Affected
linux
- linux_kernel
CWE