CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved: USB:
core: Fix deadlock in port “disable” sysfs attribute The show and store
callback routines for the “disable” sysfs attribute file in port.c acquire
the device lock for the port’s parent hub device. This can cause problems
if another process has locked the hub to remove it or change its
configuration: Removing the hub or changing its configuration requires the
hub interface to be removed, which requires the port device to be removed,
and device_del() waits until all outstanding sysfs attribute callbacks for
the ports have returned. The lock can’t be released until then. But the
disable_show() or disable_store() routine can’t return until after it has
acquired the lock. The resulting deadlock can be avoided by calling
sysfs_break_active_protection(). This will cause the sysfs core not to wait
for the attribute’s callback routine to return, allowing the removal to
proceed. The disadvantage is that after making this call, there is no
guarantee that the hub structure won’t be deallocated at any moment. To
prevent this, we have to acquire a reference to it first by calling
hub_get().
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 24.04 | noarch | linux | < 6.8.0-35.35 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < 6.8.0-1009.9 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-azure | < 6.8.0-1008.8 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-azure-6.5 | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-gcp | < 6.8.0-1008.9 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-gcp-6.5 | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-gke | < 6.8.0-1004.7 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-ibm | < 6.8.0-1006.6 | UNKNOWN |
ubuntu | 24.04 | noarch | linux-lowlatency | < 6.8.0-35.35.1 | UNKNOWN |
git.kernel.org/linus/f4d1960764d8a70318b02f15203a1be2b2554ca1 (6.9-rc2)
git.kernel.org/stable/c/4facc9421117ba9d8148c73771b213887fec77f7
git.kernel.org/stable/c/73d1589b91f2099e5f6534a8497b7c6b527e064e
git.kernel.org/stable/c/9dac54f08198147f5ec0ec52fcf1bc8ac899ac05
git.kernel.org/stable/c/f4d1960764d8a70318b02f15203a1be2b2554ca1
git.kernel.org/stable/c/f51849833705dea5b4f9b0c8de714dd87bd6c95c
launchpad.net/bugs/cve/CVE-2024-26933
nvd.nist.gov/vuln/detail/CVE-2024-26933
security-tracker.debian.org/tracker/CVE-2024-26933
ubuntu.com/security/notices/USN-6816-1
ubuntu.com/security/notices/USN-6817-1
ubuntu.com/security/notices/USN-6817-2
ubuntu.com/security/notices/USN-6817-3
ubuntu.com/security/notices/USN-6878-1
www.cve.org/CVERecord?id=CVE-2024-26933