CVE-2024-41035 (GCVE-0-2024-41035)

Vulnerability from cvelistv5 – Published: 2024-07-29 14:31 – Updated: 2026-05-11 20:24
VLAI?
Title
USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor
Summary
In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor Syzbot has identified a bug in usbcore (see the Closes: tag below) caused by our assumption that the reserved bits in an endpoint descriptor's bEndpointAddress field will always be 0. As a result of the bug, the endpoint_is_duplicate() routine in config.c (and possibly other routines as well) may believe that two descriptors are for distinct endpoints, even though they have the same direction and endpoint number. This can lead to confusion, including the bug identified by syzbot (two descriptors with matching endpoint numbers and directions, where one was interrupt and the other was bulk). To fix the bug, we will clear the reserved bits in bEndpointAddress when we parse the descriptor. (Note that both the USB-2.0 and USB-3.1 specs say these bits are "Reserved, reset to zero".) This requires us to make a copy of the descriptor earlier in usb_parse_endpoint() and use the copy instead of the original when checking for duplicates.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 0a8fd1346254974c3a852338508e4a4cddbb35f1 , < d8418fd083d1b90a6c007cf8dcf81aeae274727b (git)
Affected: 0a8fd1346254974c3a852338508e4a4cddbb35f1 , < 60abea505b726b38232a0ef410d2bd1994a77f78 (git)
Affected: 0a8fd1346254974c3a852338508e4a4cddbb35f1 , < d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf (git)
Affected: 0a8fd1346254974c3a852338508e4a4cddbb35f1 , < 2bd8534a1b83c65702aec3cab164170f8e584188 (git)
Affected: 0a8fd1346254974c3a852338508e4a4cddbb35f1 , < 9edcf317620d7c6a8354911b69b874cf89716646 (git)
Affected: 0a8fd1346254974c3a852338508e4a4cddbb35f1 , < 647d61aef106dbed9c70447bcddbd4968e67ca64 (git)
Affected: 0a8fd1346254974c3a852338508e4a4cddbb35f1 , < 37514a5c1251a8c5c95c323f55050736e7069ac7 (git)
Affected: 0a8fd1346254974c3a852338508e4a4cddbb35f1 , < a368ecde8a5055b627749b09c6218ef793043e47 (git)
Affected: c3726b442527ab31c7110d0445411f5b5343db01 (git)
Affected: 15668b4354b38b41b316571deed2763d631b2977 (git)
Affected: 8597a9245181656ae2ef341906e5f40af323fbca (git)
Affected: 264024a2676ba7d91fe7b1713b2c32d1b0b508cb (git)
Affected: b0de742a1be16b76b534d088682f18cf57f012d2 (git)
Affected: 7cc00abef071a8a7d0f4457b7afa2f57f683d83f (git)
Affected: 05b0f2fc3c2f9efda47439557e0d51faca7e43ed (git)
Create a notification for this product.
Linux Linux Affected: 4.10
Unaffected: 0 , < 4.10 (semver)
Unaffected: 4.19.318 , ≤ 4.19.* (semver)
Unaffected: 5.4.280 , ≤ 5.4.* (semver)
Unaffected: 5.10.222 , ≤ 5.10.* (semver)
Unaffected: 5.15.163 , ≤ 5.15.* (semver)
Unaffected: 6.1.100 , ≤ 6.1.* (semver)
Unaffected: 6.6.41 , ≤ 6.6.* (semver)
Unaffected: 6.9.10 , ≤ 6.9.* (semver)
Unaffected: 6.10 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-11-03T21:59:32.228Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d8418fd083d1b90a6c007cf8dcf81aeae274727b"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/2bd8534a1b83c65702aec3cab164170f8e584188"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/9edcf317620d7c6a8354911b69b874cf89716646"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/647d61aef106dbed9c70447bcddbd4968e67ca64"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/37514a5c1251a8c5c95c323f55050736e7069ac7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://git.kernel.org/stable/c/a368ecde8a5055b627749b09c6218ef793043e47"
          },
          {
            "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41035",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-10T16:23:33.705561Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-11T17:34:03.568Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/core/config.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "d8418fd083d1b90a6c007cf8dcf81aeae274727b",
              "status": "affected",
              "version": "0a8fd1346254974c3a852338508e4a4cddbb35f1",
              "versionType": "git"
            },
            {
              "lessThan": "60abea505b726b38232a0ef410d2bd1994a77f78",
              "status": "affected",
              "version": "0a8fd1346254974c3a852338508e4a4cddbb35f1",
              "versionType": "git"
            },
            {
              "lessThan": "d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf",
              "status": "affected",
              "version": "0a8fd1346254974c3a852338508e4a4cddbb35f1",
              "versionType": "git"
            },
            {
              "lessThan": "2bd8534a1b83c65702aec3cab164170f8e584188",
              "status": "affected",
              "version": "0a8fd1346254974c3a852338508e4a4cddbb35f1",
              "versionType": "git"
            },
            {
              "lessThan": "9edcf317620d7c6a8354911b69b874cf89716646",
              "status": "affected",
              "version": "0a8fd1346254974c3a852338508e4a4cddbb35f1",
              "versionType": "git"
            },
            {
              "lessThan": "647d61aef106dbed9c70447bcddbd4968e67ca64",
              "status": "affected",
              "version": "0a8fd1346254974c3a852338508e4a4cddbb35f1",
              "versionType": "git"
            },
            {
              "lessThan": "37514a5c1251a8c5c95c323f55050736e7069ac7",
              "status": "affected",
              "version": "0a8fd1346254974c3a852338508e4a4cddbb35f1",
              "versionType": "git"
            },
            {
              "lessThan": "a368ecde8a5055b627749b09c6218ef793043e47",
              "status": "affected",
              "version": "0a8fd1346254974c3a852338508e4a4cddbb35f1",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "c3726b442527ab31c7110d0445411f5b5343db01",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "15668b4354b38b41b316571deed2763d631b2977",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "8597a9245181656ae2ef341906e5f40af323fbca",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "264024a2676ba7d91fe7b1713b2c32d1b0b508cb",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "b0de742a1be16b76b534d088682f18cf57f012d2",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "7cc00abef071a8a7d0f4457b7afa2f57f683d83f",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "05b0f2fc3c2f9efda47439557e0d51faca7e43ed",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/usb/core/config.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.10"
            },
            {
              "lessThan": "4.10",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.318",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.280",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.222",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.163",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.100",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.41",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.9.*",
              "status": "unaffected",
              "version": "6.9.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.10",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.318",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.280",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.222",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.163",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.100",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.41",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.9.10",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.10",
                  "versionStartIncluding": "4.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.2.87",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.10.106",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.12.70",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "3.16.42",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.1.39",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.4.42",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.9.3",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor\n\nSyzbot has identified a bug in usbcore (see the Closes: tag below)\ncaused by our assumption that the reserved bits in an endpoint\ndescriptor\u0027s bEndpointAddress field will always be 0.  As a result of\nthe bug, the endpoint_is_duplicate() routine in config.c (and possibly\nother routines as well) may believe that two descriptors are for\ndistinct endpoints, even though they have the same direction and\nendpoint number.  This can lead to confusion, including the bug\nidentified by syzbot (two descriptors with matching endpoint numbers\nand directions, where one was interrupt and the other was bulk).\n\nTo fix the bug, we will clear the reserved bits in bEndpointAddress\nwhen we parse the descriptor.  (Note that both the USB-2.0 and USB-3.1\nspecs say these bits are \"Reserved, reset to zero\".)  This requires us\nto make a copy of the descriptor earlier in usb_parse_endpoint() and\nuse the copy instead of the original when checking for duplicates."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-11T20:24:54.325Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/d8418fd083d1b90a6c007cf8dcf81aeae274727b"
        },
        {
          "url": "https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78"
        },
        {
          "url": "https://git.kernel.org/stable/c/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf"
        },
        {
          "url": "https://git.kernel.org/stable/c/2bd8534a1b83c65702aec3cab164170f8e584188"
        },
        {
          "url": "https://git.kernel.org/stable/c/9edcf317620d7c6a8354911b69b874cf89716646"
        },
        {
          "url": "https://git.kernel.org/stable/c/647d61aef106dbed9c70447bcddbd4968e67ca64"
        },
        {
          "url": "https://git.kernel.org/stable/c/37514a5c1251a8c5c95c323f55050736e7069ac7"
        },
        {
          "url": "https://git.kernel.org/stable/c/a368ecde8a5055b627749b09c6218ef793043e47"
        }
      ],
      "title": "USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2024-41035",
    "datePublished": "2024-07-29T14:31:49.876Z",
    "dateReserved": "2024-07-12T12:17:45.619Z",
    "dateUpdated": "2026-05-11T20:24:54.325Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2024-41035",
      "date": "2026-05-19",
      "epss": "0.0001",
      "percentile": "0.01077"
    },
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nUSB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor\\n\\nSyzbot has identified a bug in usbcore (see the Closes: tag below)\\ncaused by our assumption that the reserved bits in an endpoint\\ndescriptor\u0027s bEndpointAddress field will always be 0.  As a result of\\nthe bug, the endpoint_is_duplicate() routine in config.c (and possibly\\nother routines as well) may believe that two descriptors are for\\ndistinct endpoints, even though they have the same direction and\\nendpoint number.  This can lead to confusion, including the bug\\nidentified by syzbot (two descriptors with matching endpoint numbers\\nand directions, where one was interrupt and the other was bulk).\\n\\nTo fix the bug, we will clear the reserved bits in bEndpointAddress\\nwhen we parse the descriptor.  (Note that both the USB-2.0 and USB-3.1\\nspecs say these bits are \\\"Reserved, reset to zero\\\".)  This requires us\\nto make a copy of the descriptor earlier in usb_parse_endpoint() and\\nuse the copy instead of the original when checking for duplicates.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: USB: core: corrige el error de endpoint duplicado borrando los bits reservados en el descriptor Syzbot ha identificado un error en usbcore (consulte la etiqueta Closes: a continuaci\\u00f3n) causado por nuestra suposici\\u00f3n de que los bits reservados en el campo bEndpointAddress de un descriptor de endpoint siempre ser\\u00e1 0. Como resultado del error, la rutina endpoint_is_duplicate() en config.c (y posiblemente tambi\\u00e9n otras rutinas) puede creer que dos descriptores son para endpoints distintos, aunque tengan la misma direcci\\u00f3n y n\\u00famero de endpoint. Esto puede generar confusi\\u00f3n, incluido el error identificado por syzbot (dos descriptores con direcciones y n\\u00fameros de endpoint coincidentes, donde uno era de interrupci\\u00f3n y el otro era masivo). Para corregir el error, borraremos los bits reservados en bEndpointAddress cuando analicemos el descriptor. (Tenga en cuenta que las especificaciones de USB-2.0 y USB-3.1 dicen que estos bits est\\u00e1n \\\"Reservados, restablecidos a cero\\\"). Esto requiere que hagamos una copia del descriptor anteriormente en usb_parse_endpoint() y usemos la copia en lugar del original cuando buscando duplicados.\"}]",
      "id": "CVE-2024-41035",
      "lastModified": "2024-11-21T09:32:06.580",
      "published": "2024-07-29T15:15:12.077",
      "references": "[{\"url\": \"https://git.kernel.org/stable/c/2bd8534a1b83c65702aec3cab164170f8e584188\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/37514a5c1251a8c5c95c323f55050736e7069ac7\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/647d61aef106dbed9c70447bcddbd4968e67ca64\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/9edcf317620d7c6a8354911b69b874cf89716646\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/a368ecde8a5055b627749b09c6218ef793043e47\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/d8418fd083d1b90a6c007cf8dcf81aeae274727b\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/2bd8534a1b83c65702aec3cab164170f8e584188\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/37514a5c1251a8c5c95c323f55050736e7069ac7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/647d61aef106dbed9c70447bcddbd4968e67ca64\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/9edcf317620d7c6a8354911b69b874cf89716646\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/a368ecde8a5055b627749b09c6218ef793043e47\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/d8418fd083d1b90a6c007cf8dcf81aeae274727b\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      "vulnStatus": "Awaiting Analysis"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-41035\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-07-29T15:15:12.077\",\"lastModified\":\"2025-11-03T22:17:25.547\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nUSB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor\\n\\nSyzbot has identified a bug in usbcore (see the Closes: tag below)\\ncaused by our assumption that the reserved bits in an endpoint\\ndescriptor\u0027s bEndpointAddress field will always be 0.  As a result of\\nthe bug, the endpoint_is_duplicate() routine in config.c (and possibly\\nother routines as well) may believe that two descriptors are for\\ndistinct endpoints, even though they have the same direction and\\nendpoint number.  This can lead to confusion, including the bug\\nidentified by syzbot (two descriptors with matching endpoint numbers\\nand directions, where one was interrupt and the other was bulk).\\n\\nTo fix the bug, we will clear the reserved bits in bEndpointAddress\\nwhen we parse the descriptor.  (Note that both the USB-2.0 and USB-3.1\\nspecs say these bits are \\\"Reserved, reset to zero\\\".)  This requires us\\nto make a copy of the descriptor earlier in usb_parse_endpoint() and\\nuse the copy instead of the original when checking for duplicates.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: USB: core: corrige el error de endpoint duplicado borrando los bits reservados en el descriptor Syzbot ha identificado un error en usbcore (consulte la etiqueta Closes: a continuaci\u00f3n) causado por nuestra suposici\u00f3n de que los bits reservados en el campo bEndpointAddress de un descriptor de endpoint siempre ser\u00e1 0. Como resultado del error, la rutina endpoint_is_duplicate() en config.c (y posiblemente tambi\u00e9n otras rutinas) puede creer que dos descriptores son para endpoints distintos, aunque tengan la misma direcci\u00f3n y n\u00famero de endpoint. Esto puede generar confusi\u00f3n, incluido el error identificado por syzbot (dos descriptores con direcciones y n\u00fameros de endpoint coincidentes, donde uno era de interrupci\u00f3n y el otro era masivo). Para corregir el error, borraremos los bits reservados en bEndpointAddress cuando analicemos el descriptor. (Tenga en cuenta que las especificaciones de USB-2.0 y USB-3.1 dicen que estos bits est\u00e1n \\\"Reservados, restablecidos a cero\\\"). Esto requiere que hagamos una copia del descriptor anteriormente en usb_parse_endpoint() y usemos la copia en lugar del original cuando buscando duplicados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.2.87\",\"versionEndExcluding\":\"3.3\",\"matchCriteriaId\":\"EDF220AE-D4D3-4C0B-BFCA-4DDB897A81FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.10.106\",\"versionEndExcluding\":\"3.11\",\"matchCriteriaId\":\"37623D83-3245-418B-AA79-7FFB56124AAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.12.70\",\"versionEndExcluding\":\"3.13\",\"matchCriteriaId\":\"432FA61C-A882-4DDE-9002-456C1D68B8C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.16.42\",\"versionEndExcluding\":\"3.17\",\"matchCriteriaId\":\"776A78BD-F513-4084-AC1D-66E45A675E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1.39\",\"versionEndExcluding\":\"4.2\",\"matchCriteriaId\":\"CD709672-0E6A-4086-8700-B6C2FDD8599C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.4.42\",\"versionEndExcluding\":\"4.5\",\"matchCriteriaId\":\"5B5C4BC4-8B31-4804-AF81-6AE3B1DB52D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.9.3\",\"versionEndExcluding\":\"4.10\",\"matchCriteriaId\":\"00C86536-59B3-45F8-98D1-954DD85D7C84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10.1\",\"versionEndExcluding\":\"4.19.318\",\"matchCriteriaId\":\"42C5A935-9E32-4C21-8C7E-5ED33CFC30F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20\",\"versionEndExcluding\":\"5.4.280\",\"matchCriteriaId\":\"625DBFAB-C3D0-4309-A27F-12D6428FB38F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.5\",\"versionEndExcluding\":\"5.10.222\",\"matchCriteriaId\":\"00696AC5-EE29-437F-97F9-C4D66608B327\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.163\",\"matchCriteriaId\":\"A97DEB09-4927-40F8-B5C6-F5BD5EAE0CFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.100\",\"matchCriteriaId\":\"100CDF74-4DB5-4FC6-A54B-BDBDB0C27137\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.41\",\"matchCriteriaId\":\"96AC42B8-D66D-4AC5-B466-E9BA7910FA29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.9.10\",\"matchCriteriaId\":\"AB2E8DEC-CFD5-4C2B-981D-E7E45A36C352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.10:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"C201E405-86F2-4F96-984A-00A865219C86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.10:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23D17CA-66C9-477F-8668-9D314841785E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.10:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA5A26AC-E4BA-4BCC-BE0A-B3F31BA5084C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.10:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE64B11-DBC1-4DA0-836C-32332216A650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.10:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"09B6110F-7933-484D-AEAF-5D15FF38647E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.10:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"75694C52-0ADF-45EC-80AC-D973535B5CB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:4.10:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"29F29665-6B16-4D9F-A417-D0743395DF01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBB4392-5FA6-4DA9-9772-8F9C750109FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"331C2F14-12C7-45D5-893D-8C52EE38EA10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3173713D-909A-4DD3-9DD4-1E171EB057EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"79F18AFA-40F7-43F0-BA30-7BDB65F918B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD973AA4-A789-49BD-8D57-B2846935D3C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F3E9E0C-AC3E-4967-AF80-6483E8AB0078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.10:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"11AF4CB9-F697-4EA4-8903-8F9417EFDA8E\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2bd8534a1b83c65702aec3cab164170f8e584188\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/37514a5c1251a8c5c95c323f55050736e7069ac7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/647d61aef106dbed9c70447bcddbd4968e67ca64\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9edcf317620d7c6a8354911b69b874cf89716646\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a368ecde8a5055b627749b09c6218ef793043e47\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d8418fd083d1b90a6c007cf8dcf81aeae274727b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/2bd8534a1b83c65702aec3cab164170f8e584188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/37514a5c1251a8c5c95c323f55050736e7069ac7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/647d61aef106dbed9c70447bcddbd4968e67ca64\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9edcf317620d7c6a8354911b69b874cf89716646\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a368ecde8a5055b627749b09c6218ef793043e47\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d8418fd083d1b90a6c007cf8dcf81aeae274727b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/d8418fd083d1b90a6c007cf8dcf81aeae274727b\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/2bd8534a1b83c65702aec3cab164170f8e584188\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/9edcf317620d7c6a8354911b69b874cf89716646\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/647d61aef106dbed9c70447bcddbd4968e67ca64\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/37514a5c1251a8c5c95c323f55050736e7069ac7\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/a368ecde8a5055b627749b09c6218ef793043e47\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T21:59:32.228Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-41035\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T16:23:33.705561Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-11T12:42:20.409Z\"}}], \"cna\": {\"title\": \"USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"0a8fd1346254974c3a852338508e4a4cddbb35f1\", \"lessThan\": \"d8418fd083d1b90a6c007cf8dcf81aeae274727b\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0a8fd1346254974c3a852338508e4a4cddbb35f1\", \"lessThan\": \"60abea505b726b38232a0ef410d2bd1994a77f78\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0a8fd1346254974c3a852338508e4a4cddbb35f1\", \"lessThan\": \"d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0a8fd1346254974c3a852338508e4a4cddbb35f1\", \"lessThan\": \"2bd8534a1b83c65702aec3cab164170f8e584188\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0a8fd1346254974c3a852338508e4a4cddbb35f1\", \"lessThan\": \"9edcf317620d7c6a8354911b69b874cf89716646\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0a8fd1346254974c3a852338508e4a4cddbb35f1\", \"lessThan\": \"647d61aef106dbed9c70447bcddbd4968e67ca64\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0a8fd1346254974c3a852338508e4a4cddbb35f1\", \"lessThan\": \"37514a5c1251a8c5c95c323f55050736e7069ac7\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"0a8fd1346254974c3a852338508e4a4cddbb35f1\", \"lessThan\": \"a368ecde8a5055b627749b09c6218ef793043e47\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"c3726b442527ab31c7110d0445411f5b5343db01\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"15668b4354b38b41b316571deed2763d631b2977\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"8597a9245181656ae2ef341906e5f40af323fbca\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"264024a2676ba7d91fe7b1713b2c32d1b0b508cb\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"b0de742a1be16b76b534d088682f18cf57f012d2\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"7cc00abef071a8a7d0f4457b7afa2f57f683d83f\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"05b0f2fc3c2f9efda47439557e0d51faca7e43ed\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/usb/core/config.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.10\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"4.10\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.19.318\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.19.*\"}, {\"status\": \"unaffected\", \"version\": \"5.4.280\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.4.*\"}, {\"status\": \"unaffected\", \"version\": \"5.10.222\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.10.*\"}, {\"status\": \"unaffected\", \"version\": \"5.15.163\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.15.*\"}, {\"status\": \"unaffected\", \"version\": \"6.1.100\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.1.*\"}, {\"status\": \"unaffected\", \"version\": \"6.6.41\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.6.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.9.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/usb/core/config.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/d8418fd083d1b90a6c007cf8dcf81aeae274727b\"}, {\"url\": \"https://git.kernel.org/stable/c/60abea505b726b38232a0ef410d2bd1994a77f78\"}, {\"url\": \"https://git.kernel.org/stable/c/d09dd21bb5215d583ca9a1cb1464dbc77a7e88cf\"}, {\"url\": \"https://git.kernel.org/stable/c/2bd8534a1b83c65702aec3cab164170f8e584188\"}, {\"url\": \"https://git.kernel.org/stable/c/9edcf317620d7c6a8354911b69b874cf89716646\"}, {\"url\": \"https://git.kernel.org/stable/c/647d61aef106dbed9c70447bcddbd4968e67ca64\"}, {\"url\": \"https://git.kernel.org/stable/c/37514a5c1251a8c5c95c323f55050736e7069ac7\"}, {\"url\": \"https://git.kernel.org/stable/c/a368ecde8a5055b627749b09c6218ef793043e47\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nUSB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor\\n\\nSyzbot has identified a bug in usbcore (see the Closes: tag below)\\ncaused by our assumption that the reserved bits in an endpoint\\ndescriptor\u0027s bEndpointAddress field will always be 0.  As a result of\\nthe bug, the endpoint_is_duplicate() routine in config.c (and possibly\\nother routines as well) may believe that two descriptors are for\\ndistinct endpoints, even though they have the same direction and\\nendpoint number.  This can lead to confusion, including the bug\\nidentified by syzbot (two descriptors with matching endpoint numbers\\nand directions, where one was interrupt and the other was bulk).\\n\\nTo fix the bug, we will clear the reserved bits in bEndpointAddress\\nwhen we parse the descriptor.  (Note that both the USB-2.0 and USB-3.1\\nspecs say these bits are \\\"Reserved, reset to zero\\\".)  This requires us\\nto make a copy of the descriptor earlier in usb_parse_endpoint() and\\nuse the copy instead of the original when checking for duplicates.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"4.19.318\", \"versionStartIncluding\": \"4.10\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.4.280\", \"versionStartIncluding\": \"4.10\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.10.222\", \"versionStartIncluding\": \"4.10\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.15.163\", \"versionStartIncluding\": \"4.10\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.1.100\", \"versionStartIncluding\": \"4.10\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.6.41\", \"versionStartIncluding\": \"4.10\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.9.10\", \"versionStartIncluding\": \"4.10\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10\", \"versionStartIncluding\": \"4.10\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"3.2.87\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"3.10.106\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"3.12.70\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"3.16.42\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.1.39\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.4.42\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.9.3\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2026-05-11T20:24:54.325Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-41035\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-11T20:24:54.325Z\", \"dateReserved\": \"2024-07-12T12:17:45.619Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-07-29T14:31:49.876Z\", \"assignerShortName\": \"Linux\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…