In the Linux kernel, the following vulnerability has been resolved:
wifi: cfg80211: reject auth/assoc to AP with our address
If the AP uses our own address as its MLD address or BSSID, then clearly something's wrong. Reject such connections so we don't try and fail later.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53540.json"
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53540.json"
[
{
"id": "CVE-2023-53540-227d230d",
"target": {
"function": "cfg80211_mlme_auth",
"file": "net/wireless/mlme.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d4e04bf3a0f098bd9033de3a5291810fa14c7a6",
"digest": {
"function_hash": "16595445419336265069352883310640696584",
"length": 604.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53540-2eecc5a1",
"target": {
"function": "cfg80211_mlme_assoc",
"file": "net/wireless/mlme.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@676a423410131d111a264d29aecbe6aadd57fb22",
"digest": {
"function_hash": "272814716052228349606572725323214346430",
"length": 1122.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53540-57604c6b",
"target": {
"function": "cfg80211_mlme_assoc",
"file": "net/wireless/mlme.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@07added2c6cd63de047bc786b39436322abb67c0",
"digest": {
"function_hash": "272814716052228349606572725323214346430",
"length": 1122.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53540-61e3cbb4",
"target": {
"file": "net/wireless/mlme.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@07added2c6cd63de047bc786b39436322abb67c0",
"digest": {
"threshold": 0.9,
"line_hashes": [
"266267391185912543524319145286324702290",
"151481252604148739881682556805300171947",
"53503225237065841465508420534833683501",
"292753722591140346189550080321890720935",
"275847722901341959181000560529160477576",
"294665116309065068818331157245210218355",
"17850231388036269065334122573289111273",
"268933214677768544126280545761309877481",
"337276098991501455533535724999162893505",
"109716709892247863725045420614493381278"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2023-53540-65cebba9",
"target": {
"function": "cfg80211_mlme_assoc",
"file": "net/wireless/mlme.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d4e04bf3a0f098bd9033de3a5291810fa14c7a6",
"digest": {
"function_hash": "272814716052228349606572725323214346430",
"length": 1122.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53540-9b0b35a3",
"target": {
"file": "net/wireless/mlme.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5d4e04bf3a0f098bd9033de3a5291810fa14c7a6",
"digest": {
"threshold": 0.9,
"line_hashes": [
"266267391185912543524319145286324702290",
"151481252604148739881682556805300171947",
"53503225237065841465508420534833683501",
"292753722591140346189550080321890720935",
"275847722901341959181000560529160477576",
"294665116309065068818331157245210218355",
"17850231388036269065334122573289111273",
"268933214677768544126280545761309877481",
"337276098991501455533535724999162893505",
"109716709892247863725045420614493381278"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2023-53540-b0e7b37a",
"target": {
"function": "cfg80211_mlme_auth",
"file": "net/wireless/mlme.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@07added2c6cd63de047bc786b39436322abb67c0",
"digest": {
"function_hash": "16595445419336265069352883310640696584",
"length": 604.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53540-ecfe124f",
"target": {
"function": "cfg80211_mlme_auth",
"file": "net/wireless/mlme.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@676a423410131d111a264d29aecbe6aadd57fb22",
"digest": {
"function_hash": "16595445419336265069352883310640696584",
"length": 604.0
},
"signature_type": "Function"
},
{
"id": "CVE-2023-53540-ffab1a94",
"target": {
"file": "net/wireless/mlme.c"
},
"signature_version": "v1",
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@676a423410131d111a264d29aecbe6aadd57fb22",
"digest": {
"threshold": 0.9,
"line_hashes": [
"266267391185912543524319145286324702290",
"151481252604148739881682556805300171947",
"53503225237065841465508420534833683501",
"292753722591140346189550080321890720935",
"275847722901341959181000560529160477576",
"294665116309065068818331157245210218355",
"17850231388036269065334122573289111273",
"268933214677768544126280545761309877481",
"337276098991501455533535724999162893505",
"109716709892247863725045420614493381278"
]
},
"signature_type": "Line"
}
]