wifi: carl9170: add a proper sanity check for endpoints
Syzkaller reports [1] hitting a warning which is caused by presence
of a wrong endpoint type at the URB sumbitting stage. While there
was a check for a specific 4th endpoint, since it can switch types
between bulk and interrupt, other endpoints are trusted implicitly.
Similar warning is triggered in a couple of other syzbot issues [2].
Fix the issue by doing a comprehensive check of all endpoints
taking into account difference between high- and full-speed
configuration.
[1] Syzkaller report:
...
WARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504
...
Call Trace:
<TASK>
carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504
carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline]
carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline]
carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028
request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107
process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
worker_thread+0x669/0x1090 kernel/workqueue.c:2436
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
</TASK>
[2] Related syzkaller crashes:
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-3840-1 | linux security update |
![]() |
DSA-5730-1 | linux security update |
![]() |
USN-6949-1 | Linux kernel vulnerabilities |
![]() |
USN-6949-2 | Linux kernel vulnerabilities |
![]() |
USN-6951-1 | Linux kernel vulnerabilities |
![]() |
USN-6951-2 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6951-3 | Linux kernel (Azure) vulnerabilities |
![]() |
USN-6951-4 | Linux kernel (BlueField) vulnerabilities |
![]() |
USN-6952-1 | Linux kernel vulnerabilities |
![]() |
USN-6953-1 | Linux kernel (Oracle) vulnerabilities |
![]() |
USN-6955-1 | Linux kernel (OEM) vulnerabilities |
![]() |
USN-6979-1 | Linux kernel (Raspberry Pi) vulnerabilities |
![]() |
USN-7007-1 | Linux kernel vulnerabilities |
![]() |
USN-7007-2 | Linux kernel vulnerabilities |
![]() |
USN-7007-3 | Linux kernel vulnerabilities |
![]() |
USN-7009-1 | Linux kernel vulnerabilities |
![]() |
USN-7009-2 | Linux kernel vulnerabilities |
![]() |
USN-7019-1 | Linux kernel vulnerabilities |
![]() |
USN-7332-1 | Linux kernel vulnerabilities |
![]() |
USN-7332-2 | Linux kernel vulnerabilities |
![]() |
USN-7332-3 | Linux kernel vulnerabilities |
![]() |
USN-7342-1 | Linux kernel vulnerabilities |
![]() |
USN-7344-1 | Linux kernel vulnerabilities |
![]() |
USN-7344-2 | Linux kernel vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 20 Oct 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 05 Nov 2024 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 12 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T09:14:16.695Z
Reserved: 2024-06-18T19:36:34.923Z
Link: CVE-2024-38567

Updated: 2024-08-02T04:12:25.875Z

Status : Analyzed
Published: 2024-06-19T14:15:16.850
Modified: 2025-10-20T22:05:58.510
Link: CVE-2024-38567


Updated: 2025-07-12T22:23:17Z