CVE-2023-53185

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53185
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53185.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53185
Downstream
Published
2025-09-15T14:15:40Z
Modified
2025-09-15T19:01:13Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes

A bad USB device is able to construct a service connection response message with target endpoint being ENDPOINT0 which is reserved for HTCCTRLRSVD_SVC and should not be modified to be used for any other services.

Reject such service connection responses.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

References

Affected packages