CVE-2023-53761 — Operation on a Resource after Expiration or Release in Linux
Severity
7.0HIGH
No vectorEPSS
0.0%
top 85.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 8
Description
In the Linux kernel, the following vulnerability has been resolved:
USB: usbtmc: Fix direction for 0-length ioctl control messages
The syzbot fuzzer found a problem in the usbtmc driver: When a user
submits an ioctl for a 0-length control transfer, the driver does not
check that the direction is set to OUT:
------------[ cut here ]------------
usb 3-1: BOGUS control dir, pipe 80000b80 doesn't match bRequestType fd
WARNING: CPU: 0 PID: 5100 at drivers/usb/core/urb.c:411 usb_submit_urb+0x14a7/0…
Affected Packages4 packages
▶CVEListV5linux/linux658f24f4523e41cda6a389c38b763f4c0cad6fbc — 7cef7681aa7719ff585dd06113a061ab2def7da0+6
🔴Vulnerability Details
3GHSA▶
GHSA-8x9m-r5f2-8m89: In the Linux kernel, the following vulnerability has been resolved:
USB: usbtmc: Fix direction for 0-length ioctl control messages
The syzbot fuzzer↗2025-12-08
OSV▶
CVE-2023-53761: In the Linux kernel, the following vulnerability has been resolved: USB: usbtmc: Fix direction for 0-length ioctl control messages The syzbot fuzzer f↗2025-12-08