Bug 2395297 (CVE-2023-53185) - CVE-2023-53185 kernel: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes
Summary: CVE-2023-53185 kernel: wifi: ath9k: don't allow to overwrite ENDPOINT0 attrib...
Keywords:
Status: NEW
Alias: CVE-2023-53185
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-09-15 15:06 UTC by OSIDB Bzimport
Modified: 2025-12-04 12:45 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2025:21051 0 None None None 2025-11-12 00:31:18 UTC
Red Hat Product Errata RHSA-2025:21083 0 None None None 2025-11-12 05:14:36 UTC
Red Hat Product Errata RHSA-2025:21084 0 None None None 2025-11-12 05:16:14 UTC
Red Hat Product Errata RHSA-2025:21091 0 None None None 2025-11-12 08:08:49 UTC
Red Hat Product Errata RHSA-2025:21128 0 None None None 2025-11-12 13:48:46 UTC
Red Hat Product Errata RHSA-2025:21136 0 None None None 2025-11-12 15:05:16 UTC
Red Hat Product Errata RHSA-2025:22752 0 None None None 2025-12-04 12:45:49 UTC

Description OSIDB Bzimport 2025-09-15 15:06:03 UTC
In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes

A bad USB device is able to construct a service connection response
message with target endpoint being ENDPOINT0 which is reserved for
HTC_CTRL_RSVD_SVC and should not be modified to be used for any other
services.

Reject such service connection responses.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

Comment 9 errata-xmlrpc 2025-11-12 00:31:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:21051 https://access.redhat.com/errata/RHSA-2025:21051

Comment 10 errata-xmlrpc 2025-11-12 05:14:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2025:21083 https://access.redhat.com/errata/RHSA-2025:21083

Comment 11 errata-xmlrpc 2025-11-12 05:16:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:21084 https://access.redhat.com/errata/RHSA-2025:21084

Comment 12 errata-xmlrpc 2025-11-12 08:08:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:21091 https://access.redhat.com/errata/RHSA-2025:21091

Comment 13 errata-xmlrpc 2025-11-12 13:48:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:21128 https://access.redhat.com/errata/RHSA-2025:21128

Comment 14 errata-xmlrpc 2025-11-12 15:05:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:21136 https://access.redhat.com/errata/RHSA-2025:21136

Comment 15 errata-xmlrpc 2025-12-04 12:45:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2025:22752 https://access.redhat.com/errata/RHSA-2025:22752


Note You need to log in before you can comment on or make changes to this bug.