Rapid7 Vulnerability & Exploit Database

Oracle Linux: (CVE-2024-26934) ELSA-2024-3618: kernel update

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: (CVE-2024-26934) ELSA-2024-3618: kernel update

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/01/2024
Created
06/07/2024
Added
06/06/2024
Modified
06/06/2024

Description

In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix deadlock in usb_deauthorize_interface()

Among the attribute file callback routines in

drivers/usb/core/sysfs.c, the interface_authorized_store() function is

the only one which acquires a device lock on an ancestor device: It

calls usb_deauthorize_interface(), which locks the interface's parent

USB device.

The will lead to deadlock if another process already owns that lock

and tries to remove the interface, whether through a configuration

change or because the device has been disconnected. As part of the

removal procedure, device_del() waits for all ongoing sysfs attribute

callbacks to complete. But usb_deauthorize_interface() can't complete

until the device lock has been released, and the lock won't be

released until the removal has finished.

The mechanism provided by sysfs to prevent this kind of deadlock is

to use the sysfs_break_active_protection() function, which tells sysfs

not to wait for the attribute callback.

Reported-and-tested by: Yue Sun <samsun1006219@gmail.com>

Reported by: xingwei lee <xrivendell7@gmail.com>

Solution(s)

  • oracle-linux-upgrade-kernel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;