CVE-2023-53761
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's usbtmc driver. It occurs when a user submits an ioctl request for a 0-length control transfer. The driver fails to check that the direction of the transfer is set to OUT, which leads to a mismatch in the control direction and causes errors in USB control message handling. The issue was found by the syzbot fuzzer and fixed by overriding the direction in the control request structure when the length is zero.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel's USB subsystem to handle control messages incorrectly, potentially leading to errors or unexpected behavior when communicating with USB devices using the usbtmc driver. This could affect device functionality or stability when 0-length ioctl control messages are used.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for specific warning messages related to the usbtmc driver, such as 'BOGUS control dir, pipe ... doesn\'t match bRequestType'. You can check the kernel log using the command: `dmesg | grep -i usbtmc` or `journalctl -k | grep -i usbtmc`. Additionally, running fuzzing tools like syzbot or similar USB ioctl fuzzers may help detect the issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where the usbtmc driver has been patched to fix the direction for 0-length ioctl control messages. If updating is not immediately possible, avoid using the usbtmc driver or the affected ioctl calls until a patch is applied.