CVE-2024-41097
Cisco USB ATM Endpoint Type Manipulation Vulnerability
Description
In the Linux kernel, the following vulnerability has been resolved: usb: atm: cxacru: fix endpoint checking in cxacru_bind() Syzbot is still reporting quite an old issue [1] that occurs due to incomplete checking of present usb endpoints. As such, wrong endpoints types may be used at urb sumbitting stage which in turn triggers a warning in usb_submit_urb(). Fix the issue by verifying that required endpoint types are present for both in and out endpoints, taking into account cmd endpoint type. Unfortunately, this patch has not been tested on real hardware. [1] Syzbot report: usb 1-1: BOGUS urb xfer, pipe 1 != type 3 WARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 Modules linked in: CPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: usb_hub_wq hub_event RIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 ... Call Trace: cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649 cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760 cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209 usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055 cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363 usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396 call_driver_probe drivers/base/dd.c:517 [inline] really_probe+0x23c/0xcd0 drivers/base/dd.c:595 __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777 __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894 bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427 __device_attach+0x228/0x4a0 drivers/base/dd.c:965 bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487 device_add+0xc2f/0x2180 drivers/base/core.c:3354 usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170 usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238 usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293
INFO
Published Date :
July 29, 2024, 4:15 p.m.
Last Modified :
Nov. 21, 2024, 9:32 a.m.
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Remotely Exploitable :
No
Impact Score :
3.6
Exploitability Score :
1.8
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-41097
.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-41097
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2024-41097
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/1aac4be1aaa5177506219f01dce5e29194e5e95a Added Reference https://git.kernel.org/stable/c/23926d316d2836315cb113569f91393266eb5b47 Added Reference https://git.kernel.org/stable/c/2eabb655a968b862bc0c31629a09f0fbf3c80d51 Added Reference https://git.kernel.org/stable/c/5159a81924311c1ec786ad9fdef784ead8676a6a Added Reference https://git.kernel.org/stable/c/5584c776a1af7807ca815ee6265f2c1429fc5727 Added Reference https://git.kernel.org/stable/c/75ddbf776dd04a09fb9e5267ead5d0c989f84506 Added Reference https://git.kernel.org/stable/c/ac9007520e392541a29daebaae8b9109007bc781 Added Reference https://git.kernel.org/stable/c/f536f09eb45e4de8d1b9accee9d992aa1846f1d4 -
Initial Analysis by [email protected]
Aug. 22, 2024
Action Type Old Value New Value Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Changed Reference Type https://git.kernel.org/stable/c/1aac4be1aaa5177506219f01dce5e29194e5e95a No Types Assigned https://git.kernel.org/stable/c/1aac4be1aaa5177506219f01dce5e29194e5e95a Patch Changed Reference Type https://git.kernel.org/stable/c/23926d316d2836315cb113569f91393266eb5b47 No Types Assigned https://git.kernel.org/stable/c/23926d316d2836315cb113569f91393266eb5b47 Patch Changed Reference Type https://git.kernel.org/stable/c/2eabb655a968b862bc0c31629a09f0fbf3c80d51 No Types Assigned https://git.kernel.org/stable/c/2eabb655a968b862bc0c31629a09f0fbf3c80d51 Patch Changed Reference Type https://git.kernel.org/stable/c/5159a81924311c1ec786ad9fdef784ead8676a6a No Types Assigned https://git.kernel.org/stable/c/5159a81924311c1ec786ad9fdef784ead8676a6a Patch Changed Reference Type https://git.kernel.org/stable/c/5584c776a1af7807ca815ee6265f2c1429fc5727 No Types Assigned https://git.kernel.org/stable/c/5584c776a1af7807ca815ee6265f2c1429fc5727 Patch Changed Reference Type https://git.kernel.org/stable/c/75ddbf776dd04a09fb9e5267ead5d0c989f84506 No Types Assigned https://git.kernel.org/stable/c/75ddbf776dd04a09fb9e5267ead5d0c989f84506 Patch Changed Reference Type https://git.kernel.org/stable/c/ac9007520e392541a29daebaae8b9109007bc781 No Types Assigned https://git.kernel.org/stable/c/ac9007520e392541a29daebaae8b9109007bc781 Patch Changed Reference Type https://git.kernel.org/stable/c/f536f09eb45e4de8d1b9accee9d992aa1846f1d4 No Types Assigned https://git.kernel.org/stable/c/f536f09eb45e4de8d1b9accee9d992aa1846f1d4 Patch Added CWE NIST NVD-CWE-noinfo Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 2.6.36 up to (excluding) 4.19.317 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 4.20 up to (excluding) 5.4.279 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.221 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.162 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.97 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.37 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.9.8 -
CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jul. 29, 2024
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: usb: atm: cxacru: fix endpoint checking in cxacru_bind() Syzbot is still reporting quite an old issue [1] that occurs due to incomplete checking of present usb endpoints. As such, wrong endpoints types may be used at urb sumbitting stage which in turn triggers a warning in usb_submit_urb(). Fix the issue by verifying that required endpoint types are present for both in and out endpoints, taking into account cmd endpoint type. Unfortunately, this patch has not been tested on real hardware. [1] Syzbot report: usb 1-1: BOGUS urb xfer, pipe 1 != type 3 WARNING: CPU: 0 PID: 8667 at drivers/usb/core/urb.c:502 usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 Modules linked in: CPU: 0 PID: 8667 Comm: kworker/0:4 Not tainted 5.14.0-rc4-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: usb_hub_wq hub_event RIP: 0010:usb_submit_urb+0xed2/0x18a0 drivers/usb/core/urb.c:502 ... Call Trace: cxacru_cm+0x3c0/0x8e0 drivers/usb/atm/cxacru.c:649 cxacru_card_status+0x22/0xd0 drivers/usb/atm/cxacru.c:760 cxacru_bind+0x7ac/0x11a0 drivers/usb/atm/cxacru.c:1209 usbatm_usb_probe+0x321/0x1ae0 drivers/usb/atm/usbatm.c:1055 cxacru_usb_probe+0xdf/0x1e0 drivers/usb/atm/cxacru.c:1363 usb_probe_interface+0x315/0x7f0 drivers/usb/core/driver.c:396 call_driver_probe drivers/base/dd.c:517 [inline] really_probe+0x23c/0xcd0 drivers/base/dd.c:595 __driver_probe_device+0x338/0x4d0 drivers/base/dd.c:747 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:777 __device_attach_driver+0x20b/0x2f0 drivers/base/dd.c:894 bus_for_each_drv+0x15f/0x1e0 drivers/base/bus.c:427 __device_attach+0x228/0x4a0 drivers/base/dd.c:965 bus_probe_device+0x1e4/0x290 drivers/base/bus.c:487 device_add+0xc2f/0x2180 drivers/base/core.c:3354 usb_set_configuration+0x113a/0x1910 drivers/usb/core/message.c:2170 usb_generic_driver_probe+0xba/0x100 drivers/usb/core/generic.c:238 usb_probe_device+0xd9/0x2c0 drivers/usb/core/driver.c:293 Added Reference kernel.org https://git.kernel.org/stable/c/5159a81924311c1ec786ad9fdef784ead8676a6a [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/23926d316d2836315cb113569f91393266eb5b47 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/75ddbf776dd04a09fb9e5267ead5d0c989f84506 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/1aac4be1aaa5177506219f01dce5e29194e5e95a [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/5584c776a1af7807ca815ee6265f2c1429fc5727 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/f536f09eb45e4de8d1b9accee9d992aa1846f1d4 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/ac9007520e392541a29daebaae8b9109007bc781 [No types assigned] Added Reference kernel.org https://git.kernel.org/stable/c/2eabb655a968b862bc0c31629a09f0fbf3c80d51 [No types assigned]
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-41097
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-41097
weaknesses.