-
CVE-2024-38567
- EPSS 0.07%
- Veröffentlicht 19.06.2024 14:15:16
- Zuletzt bearbeitet 21.11.2024 09:26:22
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: wifi: carl9170: add a proper sanity check for endpoints Syzkaller reports [1] hitting a warning which is caused by presence of a wrong endpoint type at the URB sumbitting stage. While there was a check for a specific 4th endpoint, since it can switch types between bulk and interrupt, other endpoints are trusted implicitly. Similar warning is triggered in a couple of other syzbot issues [2]. Fix the issue by doing a comprehensive check of all endpoints taking into account difference between high- and full-speed configuration. [1] Syzkaller report: ... WARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504 ... Call Trace: <TASK> carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504 carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline] carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline] carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028 request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289 worker_thread+0x669/0x1090 kernel/workqueue.c:2436 kthread+0x2e8/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 </TASK> [2] Related syzkaller crashes:
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
eb0f2fc3ff5806cc572cd9055ce7c52a01e97645
Version
a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status
affected
Version <
ac3ed46a8741d464bc70ebdf7433c1d786cf329d
Version
a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status
affected
Version <
8650725bb0a48b206d5a8ddad3a7488f9a5985b7
Version
a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status
affected
Version <
6a9892bf24c906b4d6b587f8759ca38bff672582
Version
a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status
affected
Version <
265c3cda471c26e0f25d0c755da94e1eb15d7a0c
Version
a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status
affected
Version <
62eb07923f3693d55b0c2d9a5a4f1ad72cb6b8fd
Version
a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status
affected
Version <
03ddc74bdfd71b84a55c9f2185d8787f258422cd
Version
a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status
affected
Version <
0fa08a55201ab9be72bacb8ea93cf752d338184f
Version
a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status
affected
Version <
b6dd09b3dac89b45d1ea3e3bd035a3859c0369a0
Version
a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
2.6.37
Status
affected
Version <
2.6.37
Version
0
Status
unaffected
Version <=
4.19.*
Version
4.19.316
Status
unaffected
Version <=
5.4.*
Version
5.4.278
Status
unaffected
Version <=
5.10.*
Version
5.10.219
Status
unaffected
Version <=
5.15.*
Version
5.15.161
Status
unaffected
Version <=
6.1.*
Version
6.1.93
Status
unaffected
Version <=
6.6.*
Version
6.6.33
Status
unaffected
Version <=
6.8.*
Version
6.8.12
Status
unaffected
Version <=
6.9.*
Version
6.9.3
Status
unaffected
Version <=
*
Version
6.10
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.214 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|