CVE-2024-38567
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/06/2024
Last modified:
04/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: carl9170: add a proper sanity check for endpoints<br />
<br />
Syzkaller reports [1] hitting a warning which is caused by presence<br />
of a wrong endpoint type at the URB sumbitting stage. While there<br />
was a check for a specific 4th endpoint, since it can switch types<br />
between bulk and interrupt, other endpoints are trusted implicitly.<br />
Similar warning is triggered in a couple of other syzbot issues [2].<br />
<br />
Fix the issue by doing a comprehensive check of all endpoints<br />
taking into account difference between high- and full-speed<br />
configuration.<br />
<br />
[1] Syzkaller report:<br />
...<br />
WARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504<br />
...<br />
Call Trace:<br />
<br />
carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504<br />
carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline]<br />
carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline]<br />
carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028<br />
request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107<br />
process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289<br />
worker_thread+0x669/0x1090 kernel/workqueue.c:2436<br />
kthread+0x2e8/0x3a0 kernel/kthread.c:376<br />
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308<br />
<br />
<br />
[2] Related syzkaller crashes:
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.37 (including) | 4.19.316 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.278 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.219 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.161 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.93 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.33 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.8.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.9 (including) | 6.9.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/03ddc74bdfd71b84a55c9f2185d8787f258422cd
- https://git.kernel.org/stable/c/0fa08a55201ab9be72bacb8ea93cf752d338184f
- https://git.kernel.org/stable/c/265c3cda471c26e0f25d0c755da94e1eb15d7a0c
- https://git.kernel.org/stable/c/62eb07923f3693d55b0c2d9a5a4f1ad72cb6b8fd
- https://git.kernel.org/stable/c/6a9892bf24c906b4d6b587f8759ca38bff672582
- https://git.kernel.org/stable/c/8650725bb0a48b206d5a8ddad3a7488f9a5985b7
- https://git.kernel.org/stable/c/ac3ed46a8741d464bc70ebdf7433c1d786cf329d
- https://git.kernel.org/stable/c/b6dd09b3dac89b45d1ea3e3bd035a3859c0369a0
- https://git.kernel.org/stable/c/eb0f2fc3ff5806cc572cd9055ce7c52a01e97645
- https://git.kernel.org/stable/c/03ddc74bdfd71b84a55c9f2185d8787f258422cd
- https://git.kernel.org/stable/c/0fa08a55201ab9be72bacb8ea93cf752d338184f
- https://git.kernel.org/stable/c/265c3cda471c26e0f25d0c755da94e1eb15d7a0c
- https://git.kernel.org/stable/c/62eb07923f3693d55b0c2d9a5a4f1ad72cb6b8fd
- https://git.kernel.org/stable/c/6a9892bf24c906b4d6b587f8759ca38bff672582
- https://git.kernel.org/stable/c/8650725bb0a48b206d5a8ddad3a7488f9a5985b7
- https://git.kernel.org/stable/c/ac3ed46a8741d464bc70ebdf7433c1d786cf329d
- https://git.kernel.org/stable/c/b6dd09b3dac89b45d1ea3e3bd035a3859c0369a0
- https://git.kernel.org/stable/c/eb0f2fc3ff5806cc572cd9055ce7c52a01e97645
- https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html



