CVE-2024-39509
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/07/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
HID: core: remove unnecessary WARN_ON() in implement()<br />
<br />
Syzkaller hit a warning [1] in a call to implement() when trying<br />
to write a value into a field of smaller size in an output report.<br />
<br />
Since implement() already has a warn message printed out with the<br />
help of hid_warn() and value in question gets trimmed with:<br />
...<br />
value &= m;<br />
...<br />
WARN_ON may be considered superfluous. Remove it to suppress future<br />
syzkaller triggers.<br />
<br />
[1]<br />
WARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 implement drivers/hid/hid-core.c:1451 [inline]<br />
WARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863<br />
Modules linked in:<br />
CPU: 0 PID: 5084 Comm: syz-executor424 Not tainted 6.9.0-rc7-syzkaller-00183-gcf87f46fd34d #0<br />
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024<br />
RIP: 0010:implement drivers/hid/hid-core.c:1451 [inline]<br />
RIP: 0010:hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863<br />
...<br />
Call Trace:<br />
<br />
__usbhid_submit_report drivers/hid/usbhid/hid-core.c:591 [inline]<br />
usbhid_submit_report+0x43d/0x9e0 drivers/hid/usbhid/hid-core.c:636<br />
hiddev_ioctl+0x138b/0x1f00 drivers/hid/usbhid/hiddev.c:726<br />
vfs_ioctl fs/ioctl.c:51 [inline]<br />
__do_sys_ioctl fs/ioctl.c:904 [inline]<br />
__se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890<br />
do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br />
do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f<br />
...
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.7 (including) | 4.19.317 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.279 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.221 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.162 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.95 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.35 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.9.6 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/30f76bc468b9b2cbbd5d3eb482661e3e4798893f
- https://git.kernel.org/stable/c/33f6832798dd3297317901cc1db556ac3ae80c24
- https://git.kernel.org/stable/c/4aa2dcfbad538adf7becd0034a3754e1bd01b2b5
- https://git.kernel.org/stable/c/655c6de2f215b61d0708db6b06305eee9bbfeba2
- https://git.kernel.org/stable/c/8bac61934cd563b073cd30b8cf6d5c758ab5ab26
- https://git.kernel.org/stable/c/955b3764671f3f157215194972d9c01a3a4bd316
- https://git.kernel.org/stable/c/bfd546fc7fd76076f81bf41b85b51ceda30949fd
- https://git.kernel.org/stable/c/f9db5fbeffb951cac3f0fb1c2eeffb79785399ca
- https://git.kernel.org/stable/c/30f76bc468b9b2cbbd5d3eb482661e3e4798893f
- https://git.kernel.org/stable/c/33f6832798dd3297317901cc1db556ac3ae80c24
- https://git.kernel.org/stable/c/4aa2dcfbad538adf7becd0034a3754e1bd01b2b5
- https://git.kernel.org/stable/c/655c6de2f215b61d0708db6b06305eee9bbfeba2
- https://git.kernel.org/stable/c/8bac61934cd563b073cd30b8cf6d5c758ab5ab26
- https://git.kernel.org/stable/c/955b3764671f3f157215194972d9c01a3a4bd316
- https://git.kernel.org/stable/c/bfd546fc7fd76076f81bf41b85b51ceda30949fd
- https://git.kernel.org/stable/c/f9db5fbeffb951cac3f0fb1c2eeffb79785399ca
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



