CVE-2024-39509

In the Linux kernel, the following vulnerability has been resolved: HID: core: remove unnecessary WARN_ON() in implement() Syzkaller hit a warning [1] in a call to implement() when trying to write a value into a field of smaller size in an output report. Since implement() already has a warn message printed out with the help of hid_warn() and value in question gets trimmed with: ... value &= m; ... WARN_ON may be considered superfluous. Remove it to suppress future syzkaller triggers. [1] WARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 implement drivers/hid/hid-core.c:1451 [inline] WARNING: CPU: 0 PID: 5084 at drivers/hid/hid-core.c:1451 hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863 Modules linked in: CPU: 0 PID: 5084 Comm: syz-executor424 Not tainted 6.9.0-rc7-syzkaller-00183-gcf87f46fd34d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024 RIP: 0010:implement drivers/hid/hid-core.c:1451 [inline] RIP: 0010:hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863 ... Call Trace: <TASK> __usbhid_submit_report drivers/hid/usbhid/hid-core.c:591 [inline] usbhid_submit_report+0x43d/0x9e0 drivers/hid/usbhid/hid-core.c:636 hiddev_ioctl+0x138b/0x1f00 drivers/hid/usbhid/hiddev.c:726 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:904 [inline] __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:890 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f ...
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*

History

17 Sep 2025, 15:29

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/30f76bc468b9b2cbbd5d3eb482661e3e4798893f - () https://git.kernel.org/stable/c/30f76bc468b9b2cbbd5d3eb482661e3e4798893f - Patch
References () https://git.kernel.org/stable/c/33f6832798dd3297317901cc1db556ac3ae80c24 - () https://git.kernel.org/stable/c/33f6832798dd3297317901cc1db556ac3ae80c24 - Patch
References () https://git.kernel.org/stable/c/4aa2dcfbad538adf7becd0034a3754e1bd01b2b5 - () https://git.kernel.org/stable/c/4aa2dcfbad538adf7becd0034a3754e1bd01b2b5 - Patch
References () https://git.kernel.org/stable/c/655c6de2f215b61d0708db6b06305eee9bbfeba2 - () https://git.kernel.org/stable/c/655c6de2f215b61d0708db6b06305eee9bbfeba2 - Patch
References () https://git.kernel.org/stable/c/8bac61934cd563b073cd30b8cf6d5c758ab5ab26 - () https://git.kernel.org/stable/c/8bac61934cd563b073cd30b8cf6d5c758ab5ab26 - Patch
References () https://git.kernel.org/stable/c/955b3764671f3f157215194972d9c01a3a4bd316 - () https://git.kernel.org/stable/c/955b3764671f3f157215194972d9c01a3a4bd316 - Patch
References () https://git.kernel.org/stable/c/bfd546fc7fd76076f81bf41b85b51ceda30949fd - () https://git.kernel.org/stable/c/bfd546fc7fd76076f81bf41b85b51ceda30949fd - Patch
References () https://git.kernel.org/stable/c/f9db5fbeffb951cac3f0fb1c2eeffb79785399ca - () https://git.kernel.org/stable/c/f9db5fbeffb951cac3f0fb1c2eeffb79785399ca - Patch
CWE CWE-617

21 Nov 2024, 09:27

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/30f76bc468b9b2cbbd5d3eb482661e3e4798893f - () https://git.kernel.org/stable/c/30f76bc468b9b2cbbd5d3eb482661e3e4798893f -
References () https://git.kernel.org/stable/c/33f6832798dd3297317901cc1db556ac3ae80c24 - () https://git.kernel.org/stable/c/33f6832798dd3297317901cc1db556ac3ae80c24 -
References () https://git.kernel.org/stable/c/4aa2dcfbad538adf7becd0034a3754e1bd01b2b5 - () https://git.kernel.org/stable/c/4aa2dcfbad538adf7becd0034a3754e1bd01b2b5 -
References () https://git.kernel.org/stable/c/655c6de2f215b61d0708db6b06305eee9bbfeba2 - () https://git.kernel.org/stable/c/655c6de2f215b61d0708db6b06305eee9bbfeba2 -
References () https://git.kernel.org/stable/c/8bac61934cd563b073cd30b8cf6d5c758ab5ab26 - () https://git.kernel.org/stable/c/8bac61934cd563b073cd30b8cf6d5c758ab5ab26 -
References () https://git.kernel.org/stable/c/955b3764671f3f157215194972d9c01a3a4bd316 - () https://git.kernel.org/stable/c/955b3764671f3f157215194972d9c01a3a4bd316 -
References () https://git.kernel.org/stable/c/bfd546fc7fd76076f81bf41b85b51ceda30949fd - () https://git.kernel.org/stable/c/bfd546fc7fd76076f81bf41b85b51ceda30949fd -
References () https://git.kernel.org/stable/c/f9db5fbeffb951cac3f0fb1c2eeffb79785399ca - () https://git.kernel.org/stable/c/f9db5fbeffb951cac3f0fb1c2eeffb79785399ca -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: HID: núcleo: eliminar WARN_ON() innecesario en implementar() Syzkaller recibió una advertencia [1] en una llamada a implementar() al intentar escribir un valor en un campo de tamaño más pequeño. tamaño en un informe de salida. Dado que implement() ya tiene un mensaje de advertencia impreso con la ayuda de hid_warn() y el valor en cuestión se recorta con: ... value &amp;= m; ... WARN_ON puede considerarse superfluo. Elimínelo para suprimir futuros desencadenantes de syzkaller. [1] ADVERTENCIA: CPU: 0 PID: 5084 en drivers/hid/hid-core.c:1451 implementar drivers/hid/hid-core.c:1451 [en línea] ADVERTENCIA: CPU: 0 PID: 5084 en drivers/hid /hid-core.c:1451 hid_output_report+0x548/0x760 drivers/hid/hid-core.c:1863 Módulos vinculados en: CPU: 0 PID: 5084 Comm: syz-executor424 No contaminado 6.9.0-rc7-syzkaller-00183 -gcf87f46fd34d #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/04/2024 RIP: 0010:implement drivers/hid/hid-core.c:1451 [en línea] RIP: 0010:hid_output_report+0x548/ 0x760 drivers/hid/hid-core.c:1863... Seguimiento de llamadas: __usbhid_submit_report drivers/hid/usbhid/hid-core.c:591 [en línea] usbhid_submit_report+0x43d/0x9e0 drivers/hid/usbhid/hid -core.c:636 hiddev_ioctl+0x138b/0x1f00 drivers/hid/usbhid/hiddev.c:726 vfs_ioctl fs/ioctl.c:51 [en línea] __do_sys_ioctl fs/ioctl.c:904 [en línea] __se_sys_ioctl+0xfc/0x170 fs /ioctl.c:890 do_syscall_x64 arch/x86/entry/common.c:52 [en línea] do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x77/0x7f...

12 Jul 2024, 16:34

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-12 13:15

Updated : 2025-09-17 15:29


NVD link : CVE-2024-39509

Mitre link : CVE-2024-39509

CVE.ORG link : CVE-2024-39509


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-617

Reachable Assertion