Advisory Published
CVE Published
Updated

CVE-2024-41035: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor

First published: Mon Jul 29 2024(Updated: )

In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor Syzbot has identified a bug in usbcore (see the Closes: tag below) caused by our assumption that the reserved bits in an endpoint descriptor's bEndpointAddress field will always be 0. As a result of the bug, the endpoint_is_duplicate() routine in config.c (and possibly other routines as well) may believe that two descriptors are for distinct endpoints, even though they have the same direction and endpoint number. This can lead to confusion, including the bug identified by syzbot (two descriptors with matching endpoint numbers and directions, where one was interrupt and the other was bulk). To fix the bug, we will clear the reserved bits in bEndpointAddress when we parse the descriptor. (Note that both the USB-2.0 and USB-3.1 specs say these bits are "Reserved, reset to zero".) This requires us to make a copy of the descriptor earlier in usb_parse_endpoint() and use the copy instead of the original when checking for duplicates.

Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 416baaa9-dc9f-4396-8d5f-8c081fb06d67

Affected SoftwareAffected VersionHow to fix
redhat/kernel<4.19.318
4.19.318
redhat/kernel<5.4.280
5.4.280
redhat/kernel<5.10.222
5.10.222
redhat/kernel<5.15.163
5.15.163
redhat/kernel<6.1.100
6.1.100
redhat/kernel<6.6.41
6.6.41
redhat/kernel<6.9.10
6.9.10
redhat/kernel<6.10
6.10
IBM Security Verify Governance - Identity Manager<=ISVG 10.0.2
IBM Security Verify Governance, Identity Manager Software Stack<=ISVG 10.0.2
IBM Security Verify Governance, Identity Manager Virtual Appliance<=ISVG 10.0.2
IBM Security Verify Governance Identity Manager Container<=ISVG 10.0.2
debian/linux
5.10.223-1
5.10.234-1
6.1.129-1
6.1.133-1
6.12.21-1
6.12.22-1
debian/linux-6.1
6.1.129-1~deb11u1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is the severity of CVE-2024-41035?

    CVE-2024-41035 is categorized as a low severity vulnerability in the Linux kernel.

  • How do I fix CVE-2024-41035?

    To mitigate CVE-2024-41035, upgrade the kernel to a version that is 4.19.318 or newer, or follow the specific package guidelines provided by your distribution.

  • What impact does CVE-2024-41035 have on systems?

    CVE-2024-41035 can lead to unexpected behavior in USB devices due to a bug in the USB core of the Linux kernel.

  • Which versions of the Linux kernel are affected by CVE-2024-41035?

    CVE-2024-41035 affects multiple versions of the Linux kernel prior to 4.19.318, 5.4.280, 5.10.222, 5.15.163, 6.1.100, and others as specified in the remediation guidelines.

  • Is CVE-2024-41035 a critical vulnerability?

    No, CVE-2024-41035 is not classified as a critical vulnerability, but it should still be addressed to ensure stable system operation.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203