{"api_version":"1","generated_at":"2026-05-13T20:24:48+00:00","cve":"CVE-2024-26934","urls":{"html":"https://cve.report/CVE-2024-26934","api":"https://cve.report/api/cve/CVE-2024-26934.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-26934","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-26934"},"summary":{"title":"USB: core: Fix deadlock in usb_deauthorize_interface()","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in usb_deauthorize_interface()\n\nAmong the attribute file callback routines in\ndrivers/usb/core/sysfs.c, the interface_authorized_store() function is\nthe only one which acquires a device lock on an ancestor device: It\ncalls usb_deauthorize_interface(), which locks the interface's parent\nUSB device.\n\nThe will lead to deadlock if another process already owns that lock\nand tries to remove the interface, whether through a configuration\nchange or because the device has been disconnected.  As part of the\nremoval procedure, device_del() waits for all ongoing sysfs attribute\ncallbacks to complete.  But usb_deauthorize_interface() can't complete\nuntil the device lock has been released, and the lock won't be\nreleased until the removal has finished.\n\nThe mechanism provided by sysfs to prevent this kind of deadlock is\nto use the sysfs_break_active_protection() function, which tells sysfs\nnot to wait for the attribute callback.\n\nReported-and-tested by: Yue Sun <samsun1006219@gmail.com>\nReported by: xingwei lee <xrivendell7@gmail.com>","state":"PUBLISHED","assigner":"Linux","published_at":"2024-05-01 06:15:08","updated_at":"2026-05-12 12:16:26"},"problem_types":["CWE-667"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.8","severity":"HIGH","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"references":[{"url":"https://git.kernel.org/stable/c/ab062fa3dc69aea88fe62162c5881ba14b50ecc5","name":"https://git.kernel.org/stable/c/ab062fa3dc69aea88fe62162c5881ba14b50ecc5","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","name":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/122a06f1068bf5e39089863f4f60b1f5d4273384","name":"https://git.kernel.org/stable/c/122a06f1068bf5e39089863f4f60b1f5d4273384","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html","name":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html","refsource":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/8cbdd324b41528994027128207fae8100dff094f","name":"https://git.kernel.org/stable/c/8cbdd324b41528994027128207fae8100dff094f","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/dbdf66250d2d33e8b27352fcb901de79f3521057","name":"https://git.kernel.org/stable/c/dbdf66250d2d33e8b27352fcb901de79f3521057","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/e451709573f8be904a8a72d0775bf114d7c291d9","name":"https://git.kernel.org/stable/c/e451709573f8be904a8a72d0775bf114d7c291d9","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/07acf979da33c721357ff27129edf74c23c036c6","name":"https://git.kernel.org/stable/c/07acf979da33c721357ff27129edf74c23c036c6","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/80ba43e9f799cbdd83842fc27db667289b3150f5","name":"https://git.kernel.org/stable/c/80ba43e9f799cbdd83842fc27db667289b3150f5","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/12d6a5681a0a5cecc2af7860f0a1613fa7c6e947","name":"https://git.kernel.org/stable/c/12d6a5681a0a5cecc2af7860f0a1613fa7c6e947","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/1b175bc579f46520b11ecda443bcd2ee4904f66a","name":"https://git.kernel.org/stable/c/1b175bc579f46520b11ecda443bcd2ee4904f66a","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","name":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-26934","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26934","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 310d2b4124c073a2057ef9d952d4d938e9b1dfd9 8cbdd324b41528994027128207fae8100dff094f git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 310d2b4124c073a2057ef9d952d4d938e9b1dfd9 12d6a5681a0a5cecc2af7860f0a1613fa7c6e947 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 310d2b4124c073a2057ef9d952d4d938e9b1dfd9 e451709573f8be904a8a72d0775bf114d7c291d9 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 310d2b4124c073a2057ef9d952d4d938e9b1dfd9 1b175bc579f46520b11ecda443bcd2ee4904f66a git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 310d2b4124c073a2057ef9d952d4d938e9b1dfd9 ab062fa3dc69aea88fe62162c5881ba14b50ecc5 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 310d2b4124c073a2057ef9d952d4d938e9b1dfd9 122a06f1068bf5e39089863f4f60b1f5d4273384 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 310d2b4124c073a2057ef9d952d4d938e9b1dfd9 dbdf66250d2d33e8b27352fcb901de79f3521057 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 310d2b4124c073a2057ef9d952d4d938e9b1dfd9 07acf979da33c721357ff27129edf74c23c036c6 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 310d2b4124c073a2057ef9d952d4d938e9b1dfd9 80ba43e9f799cbdd83842fc27db667289b3150f5 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 4.4","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 4.4 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 4.19.312 4.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.4.274 5.4.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.10.215 5.10.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.15.154 5.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.84 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.24 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.7.12 6.7.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.8.3 6.8.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.9 * original_commit_for_fix","platforms":[]},{"source":"ADP","vendor":"Siemens","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","version":"affected * custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2024","cve_id":"26934","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2024-26934","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2024-05-10T18:35:35.947702Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2024-07-05T17:21:30.301Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2024-08-02T00:21:05.693Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://git.kernel.org/stable/c/8cbdd324b41528994027128207fae8100dff094f"},{"tags":["x_transferred"],"url":"https://git.kernel.org/stable/c/12d6a5681a0a5cecc2af7860f0a1613fa7c6e947"},{"tags":["x_transferred"],"url":"https://git.kernel.org/stable/c/e451709573f8be904a8a72d0775bf114d7c291d9"},{"tags":["x_transferred"],"url":"https://git.kernel.org/stable/c/1b175bc579f46520b11ecda443bcd2ee4904f66a"},{"tags":["x_transferred"],"url":"https://git.kernel.org/stable/c/ab062fa3dc69aea88fe62162c5881ba14b50ecc5"},{"tags":["x_transferred"],"url":"https://git.kernel.org/stable/c/122a06f1068bf5e39089863f4f60b1f5d4273384"},{"tags":["x_transferred"],"url":"https://git.kernel.org/stable/c/dbdf66250d2d33e8b27352fcb901de79f3521057"},{"tags":["x_transferred"],"url":"https://git.kernel.org/stable/c/07acf979da33c721357ff27129edf74c23c036c6"},{"tags":["x_transferred"],"url":"https://git.kernel.org/stable/c/80ba43e9f799cbdd83842fc27db667289b3150f5"},{"tags":["x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"tags":["x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"}],"title":"CVE Program Container"},{"affected":[{"defaultStatus":"unknown","product":"SIMATIC S7-1500 TM MFP - GNU/Linux subsystem","vendor":"Siemens","versions":[{"lessThan":"*","status":"affected","version":"0","versionType":"custom"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T11:50:42.881Z","orgId":"0b142b55-0307-4c5a-b3c9-f314f3fb7c5e","shortName":"siemens-SADP"},"references":[{"url":"https://cert-portal.siemens.com/productcert/html/ssa-265688.html"}],"x_adpType":"supplier"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/usb/core/sysfs.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"8cbdd324b41528994027128207fae8100dff094f","status":"affected","version":"310d2b4124c073a2057ef9d952d4d938e9b1dfd9","versionType":"git"},{"lessThan":"12d6a5681a0a5cecc2af7860f0a1613fa7c6e947","status":"affected","version":"310d2b4124c073a2057ef9d952d4d938e9b1dfd9","versionType":"git"},{"lessThan":"e451709573f8be904a8a72d0775bf114d7c291d9","status":"affected","version":"310d2b4124c073a2057ef9d952d4d938e9b1dfd9","versionType":"git"},{"lessThan":"1b175bc579f46520b11ecda443bcd2ee4904f66a","status":"affected","version":"310d2b4124c073a2057ef9d952d4d938e9b1dfd9","versionType":"git"},{"lessThan":"ab062fa3dc69aea88fe62162c5881ba14b50ecc5","status":"affected","version":"310d2b4124c073a2057ef9d952d4d938e9b1dfd9","versionType":"git"},{"lessThan":"122a06f1068bf5e39089863f4f60b1f5d4273384","status":"affected","version":"310d2b4124c073a2057ef9d952d4d938e9b1dfd9","versionType":"git"},{"lessThan":"dbdf66250d2d33e8b27352fcb901de79f3521057","status":"affected","version":"310d2b4124c073a2057ef9d952d4d938e9b1dfd9","versionType":"git"},{"lessThan":"07acf979da33c721357ff27129edf74c23c036c6","status":"affected","version":"310d2b4124c073a2057ef9d952d4d938e9b1dfd9","versionType":"git"},{"lessThan":"80ba43e9f799cbdd83842fc27db667289b3150f5","status":"affected","version":"310d2b4124c073a2057ef9d952d4d938e9b1dfd9","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/usb/core/sysfs.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"4.4"},{"lessThan":"4.4","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"4.19.*","status":"unaffected","version":"4.19.312","versionType":"semver"},{"lessThanOrEqual":"5.4.*","status":"unaffected","version":"5.4.274","versionType":"semver"},{"lessThanOrEqual":"5.10.*","status":"unaffected","version":"5.10.215","versionType":"semver"},{"lessThanOrEqual":"5.15.*","status":"unaffected","version":"5.15.154","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.84","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.24","versionType":"semver"},{"lessThanOrEqual":"6.7.*","status":"unaffected","version":"6.7.12","versionType":"semver"},{"lessThanOrEqual":"6.8.*","status":"unaffected","version":"6.8.3","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"6.9","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"4.19.312","versionStartIncluding":"4.4","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.4.274","versionStartIncluding":"4.4","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.10.215","versionStartIncluding":"4.4","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.154","versionStartIncluding":"4.4","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.84","versionStartIncluding":"4.4","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.24","versionStartIncluding":"4.4","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.7.12","versionStartIncluding":"4.4","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.8.3","versionStartIncluding":"4.4","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.9","versionStartIncluding":"4.4","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in usb_deauthorize_interface()\n\nAmong the attribute file callback routines in\ndrivers/usb/core/sysfs.c, the interface_authorized_store() function is\nthe only one which acquires a device lock on an ancestor device: It\ncalls usb_deauthorize_interface(), which locks the interface's parent\nUSB device.\n\nThe will lead to deadlock if another process already owns that lock\nand tries to remove the interface, whether through a configuration\nchange or because the device has been disconnected.  As part of the\nremoval procedure, device_del() waits for all ongoing sysfs attribute\ncallbacks to complete.  But usb_deauthorize_interface() can't complete\nuntil the device lock has been released, and the lock won't be\nreleased until the removal has finished.\n\nThe mechanism provided by sysfs to prevent this kind of deadlock is\nto use the sysfs_break_active_protection() function, which tells sysfs\nnot to wait for the attribute callback.\n\nReported-and-tested by: Yue Sun <samsun1006219@gmail.com>\nReported by: xingwei lee <xrivendell7@gmail.com>"}],"providerMetadata":{"dateUpdated":"2026-05-11T20:07:11.924Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/8cbdd324b41528994027128207fae8100dff094f"},{"url":"https://git.kernel.org/stable/c/12d6a5681a0a5cecc2af7860f0a1613fa7c6e947"},{"url":"https://git.kernel.org/stable/c/e451709573f8be904a8a72d0775bf114d7c291d9"},{"url":"https://git.kernel.org/stable/c/1b175bc579f46520b11ecda443bcd2ee4904f66a"},{"url":"https://git.kernel.org/stable/c/ab062fa3dc69aea88fe62162c5881ba14b50ecc5"},{"url":"https://git.kernel.org/stable/c/122a06f1068bf5e39089863f4f60b1f5d4273384"},{"url":"https://git.kernel.org/stable/c/dbdf66250d2d33e8b27352fcb901de79f3521057"},{"url":"https://git.kernel.org/stable/c/07acf979da33c721357ff27129edf74c23c036c6"},{"url":"https://git.kernel.org/stable/c/80ba43e9f799cbdd83842fc27db667289b3150f5"}],"title":"USB: core: Fix deadlock in usb_deauthorize_interface()","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2024-26934","datePublished":"2024-05-01T05:17:27.352Z","dateReserved":"2024-02-19T14:20:24.196Z","dateUpdated":"2026-05-12T11:50:42.881Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-05-01 06:15:08","lastModifiedDate":"2026-05-12 12:16:26","problem_types":["CWE-667"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4","versionEndExcluding":"4.19.312","matchCriteriaId":"C4C98081-1B09-4E13-812A-7CF488B3FE75"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20.0","versionEndExcluding":"5.4.274","matchCriteriaId":"61B524A6-9106-4FE6-A33B-1E4EBCEB56D5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5.0","versionEndExcluding":"5.10.215","matchCriteriaId":"9B023842-6532-401F-9E36-7FB2CA379A45"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11.0","versionEndExcluding":"5.15.154","matchCriteriaId":"C82FFB5F-4A2E-49F4-AACE-EC406F625AC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16.0","versionEndExcluding":"6.1.84","matchCriteriaId":"C0AC9329-397B-4DA1-963E-935154D84671"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.0","versionEndExcluding":"6.6.24","matchCriteriaId":"D15F9C27-5FEC-4D9D-9C75-6CB330C0B299"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.7.0","versionEndExcluding":"6.7.12","matchCriteriaId":"0E4663C3-7D71-4DA9-9A13-EC2E448147C0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.8.0","versionEndExcluding":"6.8.3","matchCriteriaId":"57497073-82D5-4695-AA8B-363CA1C033BD"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.9:r1:*:*:*:*:*:*","matchCriteriaId":"E1E2BC41-356E-412A-9B5D-9B5EFCB4E942"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"26934","Ordinal":"1","Title":"USB: core: Fix deadlock in usb_deauthorize_interface()","CVE":"CVE-2024-26934","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"26934","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix deadlock in usb_deauthorize_interface()\n\nAmong the attribute file callback routines in\ndrivers/usb/core/sysfs.c, the interface_authorized_store() function is\nthe only one which acquires a device lock on an ancestor device: It\ncalls usb_deauthorize_interface(), which locks the interface's parent\nUSB device.\n\nThe will lead to deadlock if another process already owns that lock\nand tries to remove the interface, whether through a configuration\nchange or because the device has been disconnected.  As part of the\nremoval procedure, device_del() waits for all ongoing sysfs attribute\ncallbacks to complete.  But usb_deauthorize_interface() can't complete\nuntil the device lock has been released, and the lock won't be\nreleased until the removal has finished.\n\nThe mechanism provided by sysfs to prevent this kind of deadlock is\nto use the sysfs_break_active_protection() function, which tells sysfs\nnot to wait for the attribute callback.\n\nReported-and-tested by: Yue Sun <samsun1006219@gmail.com>\nReported by: xingwei lee <xrivendell7@gmail.com>","Type":"Description","Title":"USB: core: Fix deadlock in usb_deauthorize_interface()"}]}}}