From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4099C224D6 for ; Tue, 13 Feb 2024 09:13:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707815583; cv=none; b=cRit3q1AMNhkzf8DQkiQp9A0VnVp9uCCd4mTl0X5YYw1sHCDXzejF2xvTM6BtwuyuQzaYFsS57tJxnkU8msQljTJleiDnAxVP6WOl2FQjIJ6e7ySH4qy6B+v+jju9urJShxejG5iyBNROY+1XIBQk7BCS2jAkS+JmFtiP00Sfmk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707815583; c=relaxed/simple; bh=ZdvpYuoOem+1cytVxni51BxIjvqB5uumwUR6GnCs4+c=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=DlE0ZHM0TgA8/PRc3U7klxU8MUCeXrYNQjr3/oPnZyhP1ao+JbV+lAw3sGbZNEwQcT1T5hj3oQN0tQN3cNfHvfiObXBHX+rrYe4HVVQPBko6+cKFRArS1qcEf1WmyYDnqt8II/IzrwdLM2sDCSrShoxRErcp5Xjxja88yK5ou3Q= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=RDdTVePo; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="RDdTVePo" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3C059C433F1; Tue, 13 Feb 2024 09:13:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1707815582; bh=ZdvpYuoOem+1cytVxni51BxIjvqB5uumwUR6GnCs4+c=; h=From:To:Cc:Subject:Date:Reply-to:From; b=RDdTVePoT9XLB8spkhmJAVnr2n6P0luw+0XnwYImxJ6VnuvNrM+ha1KhFwn1sMkVn TLKa20BRItBBq8R5qopgFQAC0pbzA8DWRWRjOZduv2+740Lj+XLnB28BC6u9Pj6r1W m6QINg6xdBZWOzoXmbWEA5JCg3twuy3R7NZ1UdCs= From: Greg Kroah-Hartman To: linux-cve-announce@vger.kernel.org Cc: Greg Kroah-Hartman Subject: TESTING_NOT_REAL_ID_YET: USB: gadget: bRequestType is a bitfield, not a enum - test 42 Date: Tue, 13 Feb 2024 10:12:51 +0100 Message-ID: <2024021353-drainage-unstuffed-a7c0@gregkh> X-Mailer: git-send-email 2.43.1 Precedence: bulk X-Mailing-List: linux-cve-announce@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Reply-to: X-Developer-Signature: v=1; a=openpgp-sha256; l=1970; i=gregkh@linuxfoundation.org; h=from:subject:message-id; bh=ZdvpYuoOem+1cytVxni51BxIjvqB5uumwUR6GnCs4+c=; b=owGbwMvMwCRo6H6F97bub03G02pJDKmnjabZnCoq+s/Zuzl35c1cK5fQ/kVTo1LXZfd/faZQs yDuvdGJjlgWBkEmBlkxRZYv23iO7q84pOhlaHsaZg4rE8gQBi5OAZhI6V6G+cndZZ8PFj11uJy8 Ti319vTSZYq57gzzHSbNv/nu5Q8uzrLLO+0e67wRvSP7EQA= X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp; fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29 Content-Transfer-Encoding: 8bit Description =========== USB: gadget: bRequestType is a bitfield, not a enum Szymon rightly pointed out that the previous check for the endpoint direction in bRequestType was not looking at only the bit involved, but rather the whole value. Normally this is ok, but for some request types, bits other than bit 8 could be set and the check for the endpoint length could not stall correctly. Fix that up by only checking the single bit. The Linux kernel CVE team has assigned TESTING_NOT_REAL_ID_YET to this issue. Affected versions ================= Issue introduced in 4.4.295 and fixed in 4.4.296 Issue introduced in 4.9.293 and fixed in 4.9.294 Issue introduced in 4.14.258 and fixed in 4.14.259 Issue introduced in 4.19.221 and fixed in 4.19.222 Issue introduced in 5.4.165 and fixed in 5.4.168 Issue introduced in 5.10.85 and fixed in 5.10.88 Issue introduced in 5.15.8 and fixed in 5.15.11 Please note that only supported kernel versions have fixes applied to them. For a full list of currently supported kernel versions, please see https://www.kernel.org/ Unaffected versions might change over time as fixes are backported to older supported kernel versions. The official CVE entry at https://cve.org/CVERecord/?id=TESTING_NOT_REAL_ID_YET will be updated if fixes are backported, please check that for the most up to date information about this issue. Mitigation ========== The Linux kernel CVE team recommends that you update to the latest stable kernel version for this, and many other bugfixes. Individual changes are never tested alone, but rather are part of a larger kernel release. Cherry-picking individual commits is not recommended or supported by the Linux kernel community at all. If however, updating to the latest release is impossible, the individual change to resolve this issue can be found at: https://git.kernel.org/stable/linux/c/f08adf5add9a071160c68bb2a61d697f39ab0758