CVE-2023-53644
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.20 (inc) to 5.4.244 (inc) |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's radio-shark2 driver occurs because the driver does not verify whether the USB endpoints it uses are actually present and of the correct type. This lack of endpoint checks can cause the kernel to trigger warnings or errors when handling USB requests, potentially leading to instability or crashes.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to generate warnings and potentially crash or become unstable when the radio-shark2 driver interacts with USB devices that have incorrect or missing endpoints. This could lead to denial of service or system instability on affected systems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring system logs for warnings related to the radio-shark2 driver, specifically messages like 'BOGUS urb xfer, pipe 1 != type 3' or warnings from usb_submit_urb in drivers/usb/core/urb.c. You can check the kernel log using commands such as 'dmesg | grep usb' or 'journalctl -k | grep usb' to look for these warnings. Additionally, monitoring for kernel warnings related to the radio-shark2 driver may help identify attempts to trigger this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the radio-shark and radio-shark2 drivers include the added endpoint checks that prevent this issue. If updating is not immediately possible, disabling or unloading the radio-shark2 driver to prevent its use may reduce exposure until a patched kernel is applied.