Rapid7 Vulnerability & Exploit Database

Oracle Linux: (CVE-2024-26933) ELSA-2024-3618: kernel update

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: (CVE-2024-26933) ELSA-2024-3618: kernel update

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/01/2024
Created
06/07/2024
Added
06/06/2024
Modified
06/06/2024

Description

In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix deadlock in port "disable" sysfs attribute

The show and store callback routines for the "disable" sysfs attribute

file in port.c acquire the device lock for the port's parent hub

device. This can cause problems if another process has locked the hub

to remove it or change its configuration:

Removing the hub or changing its configuration requires the

hub interface to be removed, which requires the port device

to be removed, and device_del() waits until all outstanding

sysfs attribute callbacks for the ports have returned. The

lock can't be released until then.

But the disable_show() or disable_store() routine can't return

until after it has acquired the lock.

The resulting deadlock can be avoided by calling

sysfs_break_active_protection(). This will cause the sysfs core not

to wait for the attribute's callback routine to return, allowing the

removal to proceed. The disadvantage is that after making this call,

there is no guarantee that the hub structure won't be deallocated at

any moment. To prevent this, we have to acquire a reference to it

first by calling hub_get().

Solution(s)

  • oracle-linux-upgrade-kernel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;