CVE-2024-35822: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: usb: udc: remove warning when queue disabled ep It is possible trigger below warning message from mass storage function, WARNING: CPU: 6 PID: 3839 at drivers/usb/gadget/udc/core.c:294 usb_ep_queue+0x7c/0x104 pc : usb_ep_queue+0x7c/0x104 lr : fsg_main_thread+0x494/0x1b3c Root cause is mass storage function try to queue request from main thread, but other thread may already disable ep when function disable. As there is no function failure in the driver, in order to avoid effort to fix warning, change WARN_ON_ONCE() in usb_ep_queue() to pr_debug().
AI Analysis
Technical Summary
CVE-2024-35822 addresses a vulnerability in the Linux kernel's USB gadget subsystem, specifically within the mass storage function driver. The issue arises when the mass storage function attempts to queue a USB endpoint request from the main thread while another thread may have already disabled the endpoint (ep). This race condition triggers a warning message in the kernel logs: "WARNING: CPU: X PID: Y at drivers/usb/gadget/udc/core.c:294 usb_ep_queue+0x7c/0x104". The root cause is that the mass storage function does not properly synchronize access to the USB endpoint queue, leading to attempts to queue requests on endpoints that have been disabled concurrently by another thread. The fix implemented changes the kernel's behavior from raising a WARN_ON_ONCE() warning to a pr_debug() message, effectively suppressing the warning without altering the underlying driver logic. This indicates that the issue does not cause functional failure or crashes but may lead to noisy kernel logs and potential confusion during debugging or monitoring. No direct exploitation or security compromise is indicated, and no known exploits exist in the wild. The vulnerability affects specific Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2. The vulnerability is primarily a race condition in USB gadget mass storage function handling and does not impact the confidentiality, integrity, or availability of the system directly.
Potential Impact
For European organizations, the impact of CVE-2024-35822 is minimal from a security perspective. Since the vulnerability does not cause driver failure or system crashes and only results in kernel warning messages, it does not present a direct risk of data breach, privilege escalation, or denial of service. However, organizations using Linux devices that implement USB gadget mass storage functions—such as embedded systems, IoT devices, or specialized USB peripherals—may experience increased kernel log noise, which could complicate system monitoring and troubleshooting. In environments with strict logging and alerting policies, these warnings might generate false positives or obscure other critical events. The vulnerability does not appear to be exploitable remotely or without local access, limiting its threat scope. Consequently, the operational impact is low, but awareness is important for system administrators to avoid unnecessary alarm and to maintain clean system logs.
Mitigation Recommendations
To mitigate CVE-2024-35822, European organizations should: 1) Apply the latest Linux kernel updates that include the fix changing WARN_ON_ONCE() to pr_debug() in the usb_ep_queue() function. This update reduces kernel log noise without altering driver functionality. 2) Review and adjust system monitoring and alerting configurations to filter or suppress these specific USB gadget warnings if kernel updates cannot be immediately applied. 3) For embedded or specialized devices using USB gadget mass storage, coordinate with device vendors to ensure firmware or kernel patches are applied promptly. 4) Implement robust testing and validation of kernel updates in controlled environments before deployment to avoid unintended side effects. 5) Maintain awareness of USB gadget usage in their infrastructure and document any custom drivers or kernel modules that may interact with USB endpoints to facilitate rapid response if related issues arise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2024-35822: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: usb: udc: remove warning when queue disabled ep It is possible trigger below warning message from mass storage function, WARNING: CPU: 6 PID: 3839 at drivers/usb/gadget/udc/core.c:294 usb_ep_queue+0x7c/0x104 pc : usb_ep_queue+0x7c/0x104 lr : fsg_main_thread+0x494/0x1b3c Root cause is mass storage function try to queue request from main thread, but other thread may already disable ep when function disable. As there is no function failure in the driver, in order to avoid effort to fix warning, change WARN_ON_ONCE() in usb_ep_queue() to pr_debug().
AI-Powered Analysis
Technical Analysis
CVE-2024-35822 addresses a vulnerability in the Linux kernel's USB gadget subsystem, specifically within the mass storage function driver. The issue arises when the mass storage function attempts to queue a USB endpoint request from the main thread while another thread may have already disabled the endpoint (ep). This race condition triggers a warning message in the kernel logs: "WARNING: CPU: X PID: Y at drivers/usb/gadget/udc/core.c:294 usb_ep_queue+0x7c/0x104". The root cause is that the mass storage function does not properly synchronize access to the USB endpoint queue, leading to attempts to queue requests on endpoints that have been disabled concurrently by another thread. The fix implemented changes the kernel's behavior from raising a WARN_ON_ONCE() warning to a pr_debug() message, effectively suppressing the warning without altering the underlying driver logic. This indicates that the issue does not cause functional failure or crashes but may lead to noisy kernel logs and potential confusion during debugging or monitoring. No direct exploitation or security compromise is indicated, and no known exploits exist in the wild. The vulnerability affects specific Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2. The vulnerability is primarily a race condition in USB gadget mass storage function handling and does not impact the confidentiality, integrity, or availability of the system directly.
Potential Impact
For European organizations, the impact of CVE-2024-35822 is minimal from a security perspective. Since the vulnerability does not cause driver failure or system crashes and only results in kernel warning messages, it does not present a direct risk of data breach, privilege escalation, or denial of service. However, organizations using Linux devices that implement USB gadget mass storage functions—such as embedded systems, IoT devices, or specialized USB peripherals—may experience increased kernel log noise, which could complicate system monitoring and troubleshooting. In environments with strict logging and alerting policies, these warnings might generate false positives or obscure other critical events. The vulnerability does not appear to be exploitable remotely or without local access, limiting its threat scope. Consequently, the operational impact is low, but awareness is important for system administrators to avoid unnecessary alarm and to maintain clean system logs.
Mitigation Recommendations
To mitigate CVE-2024-35822, European organizations should: 1) Apply the latest Linux kernel updates that include the fix changing WARN_ON_ONCE() to pr_debug() in the usb_ep_queue() function. This update reduces kernel log noise without altering driver functionality. 2) Review and adjust system monitoring and alerting configurations to filter or suppress these specific USB gadget warnings if kernel updates cannot be immediately applied. 3) For embedded or specialized devices using USB gadget mass storage, coordinate with device vendors to ensure firmware or kernel patches are applied promptly. 4) Implement robust testing and validation of kernel updates in controlled environments before deployment to avoid unintended side effects. 5) Maintain awareness of USB gadget usage in their infrastructure and document any custom drivers or kernel modules that may interact with USB endpoints to facilitate rapid response if related issues arise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2024-05-17T12:19:12.346Z
- Cisa Enriched
- true
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982ac4522896dcbe356f
Added to database: 5/21/2025, 9:08:58 AM
Last enriched: 6/29/2025, 4:12:04 PM
Last updated: 8/4/2025, 12:30:55 PM
Views: 14
Related Threats
CVE-2025-9052: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumCVE-2025-9051: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-1929: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Risk Yazılım Teknolojileri Ltd. Şti. Reel Sektör Hazine ve Risk Yönetimi Yazılımı
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.