CVE-2023-53185

Updated: 2025-12-14 03:41:17.080266

Description:

In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes A bad USB device is able to construct a service connection response message with target endpoint being ENDPOINT0 which is reserved for HTC_CTRL_RSVD_SVC and should not be modified to be used for any other services. Reject such service connection responses. Found by Linux Verification Center (linuxtesting.org) with Syzkaller.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Released CLSA-2025:1760546935 2025-10-15 20:24:27
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Released CLSA-2025:1763731262 2025-11-21 21:48:27
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Released CLSA-2025:1763734783 2025-11-21 21:48:28
Ubuntu 16.04 ELS linux-hwe 4.15.0 5.5 MEDIUM Ignored 2026-01-16 09:27:41 CVE-2023-53185 requires a malicious USB Wi‑Fi device to be physically attached and only affects sy...
Ubuntu 16.04 ELS linux 4.4.0 5.5 MEDIUM Ignored 2026-01-16 09:26:13 CVE-2023-53185 requires a malicious USB Wi‑Fi device to be physically attached and only affects sy...
Ubuntu 18.04 ELS linux 4.15.0 5.5 MEDIUM Ignored 2026-01-16 09:26:13 CVE-2023-53185 requires a malicious USB Wi‑Fi device to be physically attached and only affects sy...