Exploit Report

Computer Security And Bug Information


CVE Title
Published Date2024-04-02T07:15Z
Modified Date2024-04-02T12:50Z
DescriptionIn the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: detect stuck ECSA element in probe resp We recently added some validation that we don't try to connect to an AP that is currently in a channel switch process, since that might want the channel to be quiet or we might not be able to connect in time to hear the switching in a beacon. This was in commit c09c4f31998b ("wifi: mac80211: don't connect to an AP while it's in a CSA process"). However, we promptly got a report that this caused new connection failures, and it turns out that the AP that we now cannot connect to is permanently advertising an extended channel switch announcement, even with quiet. The AP in question was an Asus RT-AC53, with firmware As a first step, attempt to detect that we're dealing with such a situation, so mac80211 can use this later.
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://git.kernel.org/stable/c/ce112c941c2b172afba3e913a90c380647d53975
Reference Description https://git.kernel.org/stable/c/ce112c941c2b172afba3e913a90c380647d53975
Reference URLhttps://git.kernel.org/stable/c/177fbbcb4ed6b306c1626a277fac3fb1c495a4c7
Reference Description https://git.kernel.org/stable/c/177fbbcb4ed6b306c1626a277fac3fb1c495a4c7
  • No CVSS data for this CVE

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles