CVE-2024-45011
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/09/2024
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
char: xillybus: Check USB endpoints when probing device<br />
<br />
Ensure, as the driver probes the device, that all endpoints that the<br />
driver may attempt to access exist and are of the correct type.<br />
<br />
All XillyUSB devices must have a Bulk IN and Bulk OUT endpoint at<br />
address 1. This is verified in xillyusb_setup_base_eps().<br />
<br />
On top of that, a XillyUSB device may have additional Bulk OUT<br />
endpoints. The information about these endpoints&#39; addresses is deduced<br />
from a data structure (the IDT) that the driver fetches from the device<br />
while probing it. These endpoints are checked in setup_channels().<br />
<br />
A XillyUSB device never has more than one IN endpoint, as all data<br />
towards the host is multiplexed in this single Bulk IN endpoint. This is<br />
why setup_channels() only checks OUT endpoints.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 5.15.166 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.107 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.48 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.10.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1371d32b95972d39c1e6e4bae8b6d0df1b573731
- https://git.kernel.org/stable/c/2374bf7558de915edc6ec8cb10ec3291dfab9594
- https://git.kernel.org/stable/c/25ee8b2908200fc862c0434e5ad483817d50ceda
- https://git.kernel.org/stable/c/4267131278f5cc98f8db31d035d64bdbbfe18658
- https://git.kernel.org/stable/c/5cff754692ad45d5086b75fef8cc3a99c30a1005
- https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html



