{"id":"CVE-2023-53185","summary":"wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: don't allow to overwrite ENDPOINT0 attributes\n\nA bad USB device is able to construct a service connection response\nmessage with target endpoint being ENDPOINT0 which is reserved for\nHTC_CTRL_RSVD_SVC and should not be modified to be used for any other\nservices.\n\nReject such service connection responses.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.","modified":"2026-04-02T09:43:45.654827Z","published":"2025-09-15T14:04:37.921Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:3761-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4189-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53185.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/061b0cb9327b80d7a0f63a33e7c3e2a91a71f142"},{"type":"WEB","url":"https://git.kernel.org/stable/c/09740fa9827cfbaf23ecd041e602a426f99be888"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1044187e7249073f719ebbf9e5ffb4f16f99e555"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4dc3560561a08842b4a4c07ccc5a90e5067dbb5b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6a444dffb75238c47d2d852f12cf53f12ad2cba8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/95b4b940f0fb2873dcedad81699e869eb7581c85"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9e3031eea2d45918dc44cbfc6a6029e82882916f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/be2a546c30fe8d72efa032bee612363bb75314bd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/db8df00cd6d801b3abdb145201c2bdd1c665f585"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53185.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53185"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"fb9987d0f748c983bb795a86f47522313f701a08"},{"fixed":"db8df00cd6d801b3abdb145201c2bdd1c665f585"},{"fixed":"9e3031eea2d45918dc44cbfc6a6029e82882916f"},{"fixed":"4dc3560561a08842b4a4c07ccc5a90e5067dbb5b"},{"fixed":"1044187e7249073f719ebbf9e5ffb4f16f99e555"},{"fixed":"95b4b940f0fb2873dcedad81699e869eb7581c85"},{"fixed":"09740fa9827cfbaf23ecd041e602a426f99be888"},{"fixed":"6a444dffb75238c47d2d852f12cf53f12ad2cba8"},{"fixed":"be2a546c30fe8d72efa032bee612363bb75314bd"},{"fixed":"061b0cb9327b80d7a0f63a33e7c3e2a91a71f142"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53185.json"}}],"schema_version":"1.7.5"}