In the Linux kernel, the following vulnerability has been resolved:
usb: udc: remove warning when queue disabled ep
It is possible trigger below warning message from mass storage function,
WARNING: CPU: 6 PID: 3839 at drivers/usb/gadget/udc/core.c:294 usb_ep_queue+0x7c/0x104
pc : usb_ep_queue+0x7c/0x104
lr : fsg_main_thread+0x494/0x1b3c
Root cause is mass storage function try to queue request from main thread,
but other thread may already disable ep when function disable.
As there is no function failure in the driver, in order to avoid effort
to fix warning, change WARN_ON_ONCE() in usb_ep_queue() to pr_debug().
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 19:24
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/2a587a035214fa1b5ef598aea0b81848c5b72e5e - Patch | |
| References | () https://git.kernel.org/stable/c/2b002c308e184feeaeb72987bca3f1b11e5f70b8 - Patch | |
| References | () https://git.kernel.org/stable/c/30511676eb54d480d014352bf784f02577a10252 - Patch | |
| References | () https://git.kernel.org/stable/c/36177c2595df12225b95ce74eb1ac77b43d5a58c - Patch | |
| References | () https://git.kernel.org/stable/c/3e944ddc17c042945d983e006df7860687a8849a - Patch | |
| References | () https://git.kernel.org/stable/c/68d951880d0c52c7f13dcefb5501b69b8605ce8c - Patch | |
| References | () https://git.kernel.org/stable/c/99731076722eb7ed26b0c87c879da7bb71d24290 - Patch | |
| References | () https://git.kernel.org/stable/c/df5cbb908f1687e8ab97e222a16b7890d5501acf - Patch | |
| References | () https://git.kernel.org/stable/c/f74c5e0b54b02706d9a862ac6cddade30ac86bcf - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Third Party Advisory | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
21 Nov 2024, 09:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://git.kernel.org/stable/c/2a587a035214fa1b5ef598aea0b81848c5b72e5e - | |
| References | () https://git.kernel.org/stable/c/2b002c308e184feeaeb72987bca3f1b11e5f70b8 - | |
| References | () https://git.kernel.org/stable/c/30511676eb54d480d014352bf784f02577a10252 - | |
| References | () https://git.kernel.org/stable/c/36177c2595df12225b95ce74eb1ac77b43d5a58c - | |
| References | () https://git.kernel.org/stable/c/3e944ddc17c042945d983e006df7860687a8849a - | |
| References | () https://git.kernel.org/stable/c/68d951880d0c52c7f13dcefb5501b69b8605ce8c - | |
| References | () https://git.kernel.org/stable/c/99731076722eb7ed26b0c87c879da7bb71d24290 - | |
| References | () https://git.kernel.org/stable/c/df5cbb908f1687e8ab97e222a16b7890d5501acf - | |
| References | () https://git.kernel.org/stable/c/f74c5e0b54b02706d9a862ac6cddade30ac86bcf - |
05 Nov 2024, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
27 Jun 2024, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Jun 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
17 May 2024, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-17 14:15
Updated : 2025-12-17 19:24
NVD link : CVE-2024-35822
Mitre link : CVE-2024-35822
CVE.ORG link : CVE-2024-35822
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
