First published: Mon Jul 29 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor Syzbot has identified a bug in usbcore (see the Closes: tag below) caused by our assumption that the reserved bits in an endpoint descriptor's bEndpointAddress field will always be 0. As a result of the bug, the endpoint_is_duplicate() routine in config.c (and possibly other routines as well) may believe that two descriptors are for distinct endpoints, even though they have the same direction and endpoint number. This can lead to confusion, including the bug identified by syzbot (two descriptors with matching endpoint numbers and directions, where one was interrupt and the other was bulk). To fix the bug, we will clear the reserved bits in bEndpointAddress when we parse the descriptor. (Note that both the USB-2.0 and USB-3.1 specs say these bits are "Reserved, reset to zero".) This requires us to make a copy of the descriptor earlier in usb_parse_endpoint() and use the copy instead of the original when checking for duplicates.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <4.19.318 | 4.19.318 |
redhat/kernel | <5.4.280 | 5.4.280 |
redhat/kernel | <5.10.222 | 5.10.222 |
redhat/kernel | <5.15.163 | 5.15.163 |
redhat/kernel | <6.1.100 | 6.1.100 |
redhat/kernel | <6.6.41 | 6.6.41 |
redhat/kernel | <6.9.10 | 6.9.10 |
redhat/kernel | <6.10 | 6.10 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Software Stack | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager Virtual Appliance | <=ISVG 10.0.2 | |
IBM Security Verify Governance Identity Manager Container | <=ISVG 10.0.2 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.21-1 6.12.22-1 | |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41035 is categorized as a low severity vulnerability in the Linux kernel.
To mitigate CVE-2024-41035, upgrade the kernel to a version that is 4.19.318 or newer, or follow the specific package guidelines provided by your distribution.
CVE-2024-41035 can lead to unexpected behavior in USB devices due to a bug in the USB core of the Linux kernel.
CVE-2024-41035 affects multiple versions of the Linux kernel prior to 4.19.318, 5.4.280, 5.10.222, 5.15.163, 6.1.100, and others as specified in the remediation guidelines.
No, CVE-2024-41035 is not classified as a critical vulnerability, but it should still be addressed to ensure stable system operation.