-

CVE-2024-38567

In the Linux kernel, the following vulnerability has been resolved:

wifi: carl9170: add a proper sanity check for endpoints

Syzkaller reports [1] hitting a warning which is caused by presence
of a wrong endpoint type at the URB sumbitting stage. While there
was a check for a specific 4th endpoint, since it can switch types
between bulk and interrupt, other endpoints are trusted implicitly.
Similar warning is triggered in a couple of other syzbot issues [2].

Fix the issue by doing a comprehensive check of all endpoints
taking into account difference between high- and full-speed
configuration.

[1] Syzkaller report:
...
WARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504
...
Call Trace:
 <TASK>
 carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504
 carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline]
 carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline]
 carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028
 request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107
 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
 worker_thread+0x669/0x1090 kernel/workqueue.c:2436
 kthread+0x2e8/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
 </TASK>

[2] Related syzkaller crashes:

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < eb0f2fc3ff5806cc572cd9055ce7c52a01e97645
Version a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status affected
Version < ac3ed46a8741d464bc70ebdf7433c1d786cf329d
Version a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status affected
Version < 8650725bb0a48b206d5a8ddad3a7488f9a5985b7
Version a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status affected
Version < 6a9892bf24c906b4d6b587f8759ca38bff672582
Version a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status affected
Version < 265c3cda471c26e0f25d0c755da94e1eb15d7a0c
Version a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status affected
Version < 62eb07923f3693d55b0c2d9a5a4f1ad72cb6b8fd
Version a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status affected
Version < 03ddc74bdfd71b84a55c9f2185d8787f258422cd
Version a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status affected
Version < 0fa08a55201ab9be72bacb8ea93cf752d338184f
Version a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status affected
Version < b6dd09b3dac89b45d1ea3e3bd035a3859c0369a0
Version a84fab3cbfdc427e7d366f1cc844f27b2084c26c
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.37
Status affected
Version < 2.6.37
Version 0
Status unaffected
Version <= 4.19.*
Version 4.19.316
Status unaffected
Version <= 5.4.*
Version 5.4.278
Status unaffected
Version <= 5.10.*
Version 5.10.219
Status unaffected
Version <= 5.15.*
Version 5.15.161
Status unaffected
Version <= 6.1.*
Version 6.1.93
Status unaffected
Version <= 6.6.*
Version 6.6.33
Status unaffected
Version <= 6.8.*
Version 6.8.12
Status unaffected
Version <= 6.9.*
Version 6.9.3
Status unaffected
Version <= *
Version 6.10
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.07% 0.214
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string