-

CVE-2023-53185

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes

A bad USB device is able to construct a service connection response
message with target endpoint being ENDPOINT0 which is reserved for
HTC_CTRL_RSVD_SVC and should not be modified to be used for any other
services.

Reject such service connection responses.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < db8df00cd6d801b3abdb145201c2bdd1c665f585
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 9e3031eea2d45918dc44cbfc6a6029e82882916f
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 4dc3560561a08842b4a4c07ccc5a90e5067dbb5b
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 1044187e7249073f719ebbf9e5ffb4f16f99e555
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 95b4b940f0fb2873dcedad81699e869eb7581c85
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 09740fa9827cfbaf23ecd041e602a426f99be888
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 6a444dffb75238c47d2d852f12cf53f12ad2cba8
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < be2a546c30fe8d72efa032bee612363bb75314bd
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
Version < 061b0cb9327b80d7a0f63a33e7c3e2a91a71f142
Version fb9987d0f748c983bb795a86f47522313f701a08
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.35
Status affected
Version < 2.6.35
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.322
Status unaffected
Version <= 4.19.*
Version 4.19.291
Status unaffected
Version <= 5.4.*
Version 5.4.251
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.121
Status unaffected
Version <= 6.1.*
Version 6.1.39
Status unaffected
Version <= 6.3.*
Version 6.3.13
Status unaffected
Version <= 6.4.*
Version 6.4.4
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String