Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-26934
HistoryMay 01, 2024 - 12:00 a.m.

CVE-2024-26934

2024-05-0100:00:00
ubuntu.com
ubuntu.com
12
cve-2024-26934
usb vulnerability
linux kernel

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved: USB:
core: Fix deadlock in usb_deauthorize_interface() Among the attribute file
callback routines in drivers/usb/core/sysfs.c, the
interface_authorized_store() function is the only one which acquires a
device lock on an ancestor device: It calls usb_deauthorize_interface(),
which locks the interface’s parent USB device. The will lead to deadlock if
another process already owns that lock and tries to remove the interface,
whether through a configuration change or because the device has been
disconnected. As part of the removal procedure, device_del() waits for all
ongoing sysfs attribute callbacks to complete. But
usb_deauthorize_interface() can’t complete until the device lock has been
released, and the lock won’t be released until the removal has finished.
The mechanism provided by sysfs to prevent this kind of deadlock is to use
the sysfs_break_active_protection() function, which tells sysfs not to wait
for the attribute callback. Reported-and-tested by: Yue Sun
<[email protected]> Reported by: xingwei lee <[email protected]>

Rows per page:
1-10 of 781

References

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0

Percentile

5.1%