
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2021-47582 affects the Linux kernel's USB core subsystem. The issue involves the USBDEVFSCONTROL and USBDEVFSBULK ioctls which invoke usbstartwait_urb() containing an uninterruptible wait with a user-specified timeout value. This vulnerability was discovered and disclosed in 2021 (Kernel Git).
The vulnerability occurs when a large timeout value is specified and the accessed device does not respond in a reasonable timeframe. This results in the kernel complaining about 'Task X blocked for more than N seconds'. The issue specifically manifests in the doproccontrol() and doprocbulk() functions within the USB core subsystem (Kernel Git).
When exploited, this vulnerability can cause tasks to become blocked for extended periods, potentially leading to system responsiveness issues. The blocking condition occurs in an uninterruptible state, meaning the task cannot be killed or interrupted until the timeout expires or the device responds (NVD).
The issue has been fixed by replacing usbfs's calls to usbcontrolmsg() and usbbulkmsg() with special-purpose code that uses a killable wait and GFPKERNEL rather than GFPNOIO. The fix has been implemented in the Linux kernel and is available through various distribution updates (Kernel Git).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."