CVE-2024-38565

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/06/2024
Last modified:
04/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: ar5523: enable proper endpoint verification<br /> <br /> Syzkaller reports [1] hitting a warning about an endpoint in use<br /> not having an expected type to it.<br /> <br /> Fix the issue by checking for the existence of all proper<br /> endpoints with their according types intact.<br /> <br /> Sadly, this patch has not been tested on real hardware.<br /> <br /> [1] Syzkaller report:<br /> ------------[ cut here ]------------<br /> usb 1-1: BOGUS urb xfer, pipe 3 != type 1<br /> WARNING: CPU: 0 PID: 3643 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504<br /> ...<br /> Call Trace:<br /> <br /> ar5523_cmd+0x41b/0x780 drivers/net/wireless/ath/ar5523/ar5523.c:275<br /> ar5523_cmd_read drivers/net/wireless/ath/ar5523/ar5523.c:302 [inline]<br /> ar5523_host_available drivers/net/wireless/ath/ar5523/ar5523.c:1376 [inline]<br /> ar5523_probe+0x14b0/0x1d10 drivers/net/wireless/ath/ar5523/ar5523.c:1655<br /> usb_probe_interface+0x30f/0x7f0 drivers/usb/core/driver.c:396<br /> call_driver_probe drivers/base/dd.c:560 [inline]<br /> really_probe+0x249/0xb90 drivers/base/dd.c:639<br /> __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778<br /> driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808<br /> __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936<br /> bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427<br /> __device_attach+0x1e4/0x530 drivers/base/dd.c:1008<br /> bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487<br /> device_add+0xbd9/0x1e90 drivers/base/core.c:3517<br /> usb_set_configuration+0x101d/0x1900 drivers/usb/core/message.c:2170<br /> usb_generic_driver_probe+0xbe/0x100 drivers/usb/core/generic.c:238<br /> usb_probe_device+0xd8/0x2c0 drivers/usb/core/driver.c:293<br /> call_driver_probe drivers/base/dd.c:560 [inline]<br /> really_probe+0x249/0xb90 drivers/base/dd.c:639<br /> __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778<br /> driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808<br /> __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936<br /> bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427<br /> __device_attach+0x1e4/0x530 drivers/base/dd.c:1008<br /> bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487<br /> device_add+0xbd9/0x1e90 drivers/base/core.c:3517<br /> usb_new_device.cold+0x685/0x10ad drivers/usb/core/hub.c:2573<br /> hub_port_connect drivers/usb/core/hub.c:5353 [inline]<br /> hub_port_connect_change drivers/usb/core/hub.c:5497 [inline]<br /> port_event drivers/usb/core/hub.c:5653 [inline]<br /> hub_event+0x26cb/0x45d0 drivers/usb/core/hub.c:5735<br /> process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289<br /> worker_thread+0x669/0x1090 kernel/workqueue.c:2436<br /> kthread+0x2e8/0x3a0 kernel/kthread.c:376<br /> ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306<br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.8 (including) 4.19.316 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 4.20 (including) 5.4.278 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.5 (including) 5.10.219 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.161 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.93 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.33 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.8.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.9 (including) 6.9.3 (excluding)