CVE-2024-26933

CVSS v3.1 7.8 (High)
78% Progress
EPSS 0.04 % (5th)
0.04% Progress
Affected Products 1
Advisories 16
NVD Status Analyzed

In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix deadlock in port "disable" sysfs attribute

The show and store callback routines for the "disable" sysfs attribute
file in port.c acquire the device lock for the port's parent hub
device. This can cause problems if another process has locked the hub
to remove it or change its configuration:

Removing the hub or changing its configuration requires the
hub interface to be removed, which requires the port device
to be removed, and device_del() waits until all outstanding
sysfs attribute callbacks for the ports have returned.  The
lock can't be released until then.

But the disable_show() or disable_store() routine can't return
until after it has acquired the lock.

The resulting deadlock can be avoided by calling
sysfs_break_active_protection(). This will cause the sysfs core not
to wait for the attribute's callback routine to return, allowing the
removal to proceed. The disadvantage is that after making this call,
there is no guarantee that the hub structure won't be deallocated at
any moment. To prevent this, we have to acquire a reference to it
first by calling hub_get().

Weaknesses
CWE-667
Improper Locking
CVE Status
PUBLISHED
NVD Status
Analyzed
CNA
kernel.org
Published Date
2024-05-01 06:15:07
(4 months ago)
Updated Date
2024-05-23 19:12:43
(3 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel prior 6.1.84 version cpe:2.3:o:linux:linux_kernel < 6.1.84
  Linux Kernel from 6.2.0 version and prior 6.6.24 version cpe:2.3:o:linux:linux_kernel >= 6.2.0 < 6.6.24
  Linux Kernel from 6.7.0 version and prior 6.7.12 version cpe:2.3:o:linux:linux_kernel >= 6.7.0 < 6.7.12
  Linux Kernel from 6.8.0 version and prior 6.8.3 version cpe:2.3:o:linux:linux_kernel >= 6.8.0 < 6.8.3
  Linux Kernel 6.9 R1 cpe:2.3:o:linux:linux_kernel:6.9:r1
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...