In the Linux kernel, the following vulnerability has been resolved: wifi:
mac80211: improve CSA/ECSA connection refusal As mentioned in the previous
commit, we pretty quickly found that some APs have ECSA elements stuck in
their probe response, so using that to not attempt to connect while CSA is
happening we never connect to such an AP. Improve this situation by
checking more carefully and ignoring the ECSA if cfg80211 has previously
detected the ECSA element being stuck in the probe response. Additionally,
allow connecting to an AP that’s switching to a channel it’s already using,
unless it’s using quiet mode. In this case, we may just have to adjust
bandwidth later. If it’s actually switching channels, it’s better not to
try to connect in the middle of that.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/linus/35e2385dbe787936c793d70755a5177d267a40aa (6.8-rc4)
git.kernel.org/stable/c/35e2385dbe787936c793d70755a5177d267a40aa
git.kernel.org/stable/c/ea88bde8e3fefbe4268f6991375dd629895a090a
launchpad.net/bugs/cve/CVE-2024-26682
nvd.nist.gov/vuln/detail/CVE-2024-26682
security-tracker.debian.org/tracker/CVE-2024-26682
www.cve.org/CVERecord?id=CVE-2024-26682