CVE-2024-26683
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/04/2024
Last modified:
17/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: cfg80211: detect stuck ECSA element in probe resp<br />
<br />
We recently added some validation that we don&#39;t try to<br />
connect to an AP that is currently in a channel switch<br />
process, since that might want the channel to be quiet<br />
or we might not be able to connect in time to hear the<br />
switching in a beacon. This was in commit c09c4f31998b<br />
("wifi: mac80211: don&#39;t connect to an AP while it&#39;s in<br />
a CSA process").<br />
<br />
However, we promptly got a report that this caused new<br />
connection failures, and it turns out that the AP that<br />
we now cannot connect to is permanently advertising an<br />
extended channel switch announcement, even with quiet.<br />
The AP in question was an Asus RT-AC53, with firmware<br />
3.0.0.4.380_10760-g21a5898.<br />
<br />
As a first step, attempt to detect that we&#39;re dealing<br />
with such a situation, so mac80211 can use this later.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.7.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



