Bug 1222434 (CVE-2024-26683) - VUL-0: CVE-2024-26683: kernel: wifi: cfg80211: detect stuck ECSA element in probe resp
Summary: VUL-0: CVE-2024-26683: kernel: wifi: cfg80211: detect stuck ECSA element in p...
Status: RESOLVED FIXED
Alias: CVE-2024-26683
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Jeffrey Cheung
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/399945/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-26683:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-04-08 07:42 UTC by SMASH SMASH
Modified: 2024-04-08 07:44 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-04-08 07:42:49 UTC
In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: detect stuck ECSA element in probe resp

We recently added some validation that we don't try to
connect to an AP that is currently in a channel switch
process, since that might want the channel to be quiet
or we might not be able to connect in time to hear the
switching in a beacon. This was in commit c09c4f31998b
("wifi: mac80211: don't connect to an AP while it's in
a CSA process").

However, we promptly got a report that this caused new
connection failures, and it turns out that the AP that
we now cannot connect to is permanently advertising an
extended channel switch announcement, even with quiet.
The AP in question was an Asus RT-AC53, with firmware
3.0.0.4.380_10760-g21a5898.

As a first step, attempt to detect that we're dealing
with such a situation, so mac80211 can use this later.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-26683
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2024/CVE-2024-26683.mbox
https://git.kernel.org/stable/c/ce112c941c2b172afba3e913a90c380647d53975
https://git.kernel.org/stable/c/177fbbcb4ed6b306c1626a277fac3fb1c495a4c7
https://www.cve.org/CVERecord?id=CVE-2024-26683
https://bugzilla.redhat.com/show_bug.cgi?id=2272822
Comment 1 Robert Frohl 2024-04-08 07:44:59 UTC
does not affect any SUSE kernels, closing