Skip to main content

CVE-2024-38565: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2024-38565cvecve-2024-38565
Published: Wed Jun 19 2024 (06/19/2024, 13:35:32 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: wifi: ar5523: enable proper endpoint verification Syzkaller reports [1] hitting a warning about an endpoint in use not having an expected type to it. Fix the issue by checking for the existence of all proper endpoints with their according types intact. Sadly, this patch has not been tested on real hardware. [1] Syzkaller report: ------------[ cut here ]------------ usb 1-1: BOGUS urb xfer, pipe 3 != type 1 WARNING: CPU: 0 PID: 3643 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504 ... Call Trace: <TASK> ar5523_cmd+0x41b/0x780 drivers/net/wireless/ath/ar5523/ar5523.c:275 ar5523_cmd_read drivers/net/wireless/ath/ar5523/ar5523.c:302 [inline] ar5523_host_available drivers/net/wireless/ath/ar5523/ar5523.c:1376 [inline] ar5523_probe+0x14b0/0x1d10 drivers/net/wireless/ath/ar5523/ar5523.c:1655 usb_probe_interface+0x30f/0x7f0 drivers/usb/core/driver.c:396 call_driver_probe drivers/base/dd.c:560 [inline] really_probe+0x249/0xb90 drivers/base/dd.c:639 __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808 __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936 bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427 __device_attach+0x1e4/0x530 drivers/base/dd.c:1008 bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487 device_add+0xbd9/0x1e90 drivers/base/core.c:3517 usb_set_configuration+0x101d/0x1900 drivers/usb/core/message.c:2170 usb_generic_driver_probe+0xbe/0x100 drivers/usb/core/generic.c:238 usb_probe_device+0xd8/0x2c0 drivers/usb/core/driver.c:293 call_driver_probe drivers/base/dd.c:560 [inline] really_probe+0x249/0xb90 drivers/base/dd.c:639 __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778 driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808 __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936 bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427 __device_attach+0x1e4/0x530 drivers/base/dd.c:1008 bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487 device_add+0xbd9/0x1e90 drivers/base/core.c:3517 usb_new_device.cold+0x685/0x10ad drivers/usb/core/hub.c:2573 hub_port_connect drivers/usb/core/hub.c:5353 [inline] hub_port_connect_change drivers/usb/core/hub.c:5497 [inline] port_event drivers/usb/core/hub.c:5653 [inline] hub_event+0x26cb/0x45d0 drivers/usb/core/hub.c:5735 process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289 worker_thread+0x669/0x1090 kernel/workqueue.c:2436 kthread+0x2e8/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 </TASK>

AI-Powered Analysis

AILast updated: 06/29/2025, 11:25:19 UTC

Technical Analysis

CVE-2024-38565 is a vulnerability identified in the Linux kernel specifically affecting the wireless driver for the Atheros AR5523 USB Wi-Fi chipset (ar5523). The issue arises from improper endpoint verification during USB communication within the driver. Syzkaller, a kernel fuzzing tool, reported a warning indicating that a USB Request Block (URB) transfer was attempted on a pipe whose type did not match the expected endpoint type. This suggests that the driver was not correctly validating the USB endpoints before use, potentially leading to undefined behavior or kernel warnings. The root cause is the lack of comprehensive checks ensuring that all USB endpoints exist and have the correct types before the driver interacts with them. The patch addressing this vulnerability enforces proper endpoint verification to prevent the misuse of USB endpoints. However, it is noted that this patch has not yet been tested on real hardware, which may affect confidence in its stability or completeness. The vulnerability has a CVSS 3.1 base score of 6.5, categorized as medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). This means an attacker with some level of local privileges could exploit this flaw remotely over the network to gain unauthorized access to confidential information without affecting system integrity or availability. No known exploits are currently reported in the wild. The vulnerability affects Linux kernel versions containing the specified commit hash, which corresponds to versions prior to the patch. The vulnerability is technical and specific to the USB wireless driver stack, particularly impacting systems using the AR5523 chipset or similar configurations.

Potential Impact

For European organizations, the impact of CVE-2024-38565 depends largely on the deployment of Linux systems utilizing the affected AR5523 wireless chipset. Many enterprise and industrial Linux deployments use a variety of wireless hardware; however, the AR5523 is relatively older and less common in modern commercial devices. Nonetheless, organizations with legacy hardware or specialized embedded systems that rely on this chipset could face confidentiality risks if the vulnerability is exploited. The medium severity and the requirement for local privileges reduce the likelihood of widespread exploitation, but in environments where attackers can gain local access (e.g., through compromised user accounts or insider threats), this vulnerability could be leveraged to escalate access to sensitive data. The lack of impact on integrity and availability limits the threat to data confidentiality only. Given the patch is untested on real hardware, some organizations may delay deployment, prolonging exposure. Additionally, Linux is widely used across European governments, research institutions, and enterprises, so any vulnerability in the kernel merits attention. The vulnerability could also affect cloud providers and hosting services running Linux kernels with this driver, potentially impacting multi-tenant environments if the hardware is present. Overall, the impact is moderate but should be addressed promptly to maintain confidentiality assurances.

Mitigation Recommendations

1. Immediate application of the official Linux kernel patch that enforces proper endpoint verification in the ar5523 driver once it is tested and released in stable kernel versions. 2. For organizations using the AR5523 chipset, consider upgrading to newer wireless hardware that is actively maintained and less prone to legacy vulnerabilities. 3. Restrict local access to Linux systems with affected kernels by enforcing strict user privilege management and monitoring for suspicious activity to reduce the risk of privilege escalation. 4. Employ kernel hardening techniques such as SELinux or AppArmor to limit the impact of potential exploits targeting kernel drivers. 5. Regularly update Linux systems to the latest stable kernel versions to incorporate security fixes promptly. 6. Conduct thorough testing of patches in controlled environments before deployment to production, especially given the patch’s untested status on real hardware. 7. Monitor security advisories and vendor updates for any emerging exploit reports or additional mitigations related to this vulnerability. 8. For cloud and hosting providers, audit hardware inventories to identify presence of affected chipsets and isolate or upgrade affected nodes accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-06-18T19:36:34.923Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9829c4522896dcbe29c7

Added to database: 5/21/2025, 9:08:57 AM

Last enriched: 6/29/2025, 11:25:19 AM

Last updated: 8/5/2025, 6:04:11 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats