Updated: 2025-12-14 03:41:17.080266
Description:
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes A bad USB device is able to construct a service connection response message with target endpoint being ENDPOINT0 which is reserved for HTC_CTRL_RSVD_SVC and should not be modified to be used for any other services. Reject such service connection responses. Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | MEDIUM | 5.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | kernel | 5.14.0 | 5.5 | MEDIUM | Released | CLSA-2025:1760546935 | 2025-10-15 20:24:27 | |
| CentOS 8.4 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Released | CLSA-2025:1763731262 | 2025-11-21 21:48:27 | |
| CentOS 8.5 ELS | kernel | 4.18.0 | 5.5 | MEDIUM | Released | CLSA-2025:1763734783 | 2025-11-21 21:48:28 | |
| Ubuntu 16.04 ELS | linux-hwe | 4.15.0 | 5.5 | MEDIUM | Ignored | 2026-01-16 09:27:41 | CVE-2023-53185 requires a malicious USB Wi‑Fi device to be physically attached and only affects sy... | |
| Ubuntu 16.04 ELS | linux | 4.4.0 | 5.5 | MEDIUM | Ignored | 2026-01-16 09:26:13 | CVE-2023-53185 requires a malicious USB Wi‑Fi device to be physically attached and only affects sy... | |
| Ubuntu 18.04 ELS | linux | 4.15.0 | 5.5 | MEDIUM | Ignored | 2026-01-16 09:26:13 | CVE-2023-53185 requires a malicious USB Wi‑Fi device to be physically attached and only affects sy... |