CVE-2023-53548

Source
https://cve.org/CVERecord?id=CVE-2023-53548
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53548.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53548
Downstream
Related
Published
2025-10-04T15:16:55.612Z
Modified
2026-05-13T03:52:30.356961836Z
Summary
net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb
Details

In the Linux kernel, the following vulnerability has been resolved:

net: usbnet: Fix WARNING in usbnetstartxmit/usbsubmiturb

The syzbot fuzzer identified a problem in the usbnet driver:

usb 1-1: BOGUS urb xfer, pipe 3 != type 1 WARNING: CPU: 0 PID: 754 at drivers/usb/core/urb.c:504 usbsubmiturb+0xed6/0x1880 drivers/usb/core/urb.c:504 Modules linked in: CPU: 0 PID: 754 Comm: kworker/0:2 Not tainted 6.4.0-rc7-syzkaller-00014-g692b7dc87ca6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 Workqueue: mld mldifcwork RIP: 0010:usbsubmiturb+0xed6/0x1880 drivers/usb/core/urb.c:504 Code: 7c 24 18 e8 2c b4 5b fb 48 8b 7c 24 18 e8 42 07 f0 fe 41 89 d8 44 89 e1 4c 89 ea 48 89 c6 48 c7 c7 a0 c9 fc 8a e8 5a 6f 23 fb <0f> 0b e9 58 f8 ff ff e8 fe b3 5b fb 48 81 c5 c0 05 00 00 e9 84 f7 RSP: 0018:ffffc9000463f568 EFLAGS: 00010086 RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: ffff88801eb28000 RSI: ffffffff814c03b7 RDI: 0000000000000001 RBP: ffff8881443b7190 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000003 R13: ffff88802a77cb18 R14: 0000000000000003 R15: ffff888018262500 FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000556a99c15a18 CR3: 0000000028c71000 CR4: 0000000000350ef0 Call Trace: <TASK> usbnetstartxmit+0xfe5/0x2190 drivers/net/usb/usbnet.c:1453 __netdevstartxmit include/linux/netdevice.h:4918 [inline] netdevstartxmit include/linux/netdevice.h:4932 [inline] xmitone net/core/dev.c:3578 [inline] devhardstartxmit+0x187/0x700 net/core/dev.c:3594 ...

This bug is caused by the fact that usbnet trusts the bulk endpoint addresses its probe routine receives in the driver_info structure, and it does not check to see that these endpoints actually exist and have the expected type and directions.

The fix is simply to add such a check.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53548.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2e55cc7210fef90f88201e860d8767594974574e
Fixed
a0715d04cf687a7e21f0d6ac8c1d479294a3f6f8
Fixed
53c250ea57cf03af41339234b9855ae284f9db91
Fixed
a05ac5d00eb7fcb2fda806caa4f56e88df6bc6bb
Fixed
ec0d0be41721aca683c5606354a58ee2c687e3f8
Fixed
27d0f755d649d388fcd12f01436c9a33289e14e3
Fixed
1bebbd9b8037a9cc75984317cb495dec4824c399
Fixed
0dd3e0c31bf3e933fb85faf1443833aef90b8e46
Fixed
5e1627cb43ddf1b24b92eb26f8d958a3f5676ccb

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53548.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.14
Fixed
4.14.322
Type
ECOSYSTEM
Events
Introduced
4.15.0
Fixed
4.19.291
Type
ECOSYSTEM
Events
Introduced
4.20.0
Fixed
5.4.253
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.190
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.126
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.45
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53548.json"