[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2024-26934Date: (C)2024-05-24   (M)2024-06-28


In the Linux kernel, the following vulnerability has been resolved: USB: core: Fix deadlock in usb_deauthorize_interface() Among the attribute file callback routines in drivers/usb/core/sysfs.c, the interface_authorized_store() function is the only one which acquires a device lock on an ancestor device: It calls usb_deauthorize_interface(), which locks the interface's parent USB device. The will lead to deadlock if another process already owns that lock and tries to remove the interface, whether through a configuration change or because the device has been disconnected. As part of the removal procedure, device_del() waits for all ongoing sysfs attribute callbacks to complete. But usb_deauthorize_interface() can't complete until the device lock has been released, and the lock won't be released until the removal has finished. The mechanism provided by sysfs to prevent this kind of deadlock is to use the sysfs_break_active_protection() function, which tells sysfs not to wait for the attribute callback. Reported-and-tested by: Yue Sun Reported by: xingwei lee

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.8CVSS Score :
Exploit Score: 1.8Exploit Score:
Impact Score: 5.9Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: LOWAuthentication:
User Interaction: NONEConfidentiality:
Scope: UNCHANGEDIntegrity:
Confidentiality: HIGHAvailability:
Integrity: HIGH 
Availability: HIGH 
  
Reference:
https://git.kernel.org/stable/c/07acf979da33c721357ff27129edf74c23c036c6
https://git.kernel.org/stable/c/122a06f1068bf5e39089863f4f60b1f5d4273384
https://git.kernel.org/stable/c/12d6a5681a0a5cecc2af7860f0a1613fa7c6e947
https://git.kernel.org/stable/c/1b175bc579f46520b11ecda443bcd2ee4904f66a
https://git.kernel.org/stable/c/80ba43e9f799cbdd83842fc27db667289b3150f5
https://git.kernel.org/stable/c/8cbdd324b41528994027128207fae8100dff094f
https://git.kernel.org/stable/c/ab062fa3dc69aea88fe62162c5881ba14b50ecc5
https://git.kernel.org/stable/c/dbdf66250d2d33e8b27352fcb901de79f3521057
https://git.kernel.org/stable/c/e451709573f8be904a8a72d0775bf114d7c291d9
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html

CWE    1
CWE-667
OVAL    8
oval:org.secpod.oval:def:709006
oval:org.secpod.oval:def:708990
oval:org.secpod.oval:def:89051967
oval:org.secpod.oval:def:708989
...

© SecPod Technologies