{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-26963","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-02-19T14:20:24.201Z","datePublished":"2024-05-01T05:19:24.573Z","dateUpdated":"2025-05-04T09:00:55.552Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T09:00:55.552Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3-am62: fix module unload/reload behavior\n\nAs runtime PM is enabled, the module can be runtime\nsuspended when .remove() is called.\n\nDo a pm_runtime_get_sync() to make sure module is active\nbefore doing any register operations.\n\nDoing a pm_runtime_put_sync() should disable the refclk\nso no need to disable it again.\n\nFixes the below warning at module removel.\n\n[   39.705310] ------------[ cut here ]------------\n[   39.710004] clk:162:3 already disabled\n[   39.713941] WARNING: CPU: 0 PID: 921 at drivers/clk/clk.c:1090 clk_core_disable+0xb0/0xb8\n\nWe called of_platform_populate() in .probe() so call the\ncleanup function of_platform_depopulate() in .remove().\nGet rid of the now unnnecessary dwc3_ti_remove_core().\nWithout this, module re-load doesn't work properly."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/usb/dwc3/dwc3-am62.c"],"versions":[{"version":"e8784c0aec03a2581ee55827ba694e129d6a57ad","lessThan":"6c6a45645a2e6a272dfde14eddbb6706de63c25d","status":"affected","versionType":"git"},{"version":"e8784c0aec03a2581ee55827ba694e129d6a57ad","lessThan":"7dfed9855397d0df4c6f748d1f66547ab3bad766","status":"affected","versionType":"git"},{"version":"e8784c0aec03a2581ee55827ba694e129d6a57ad","lessThan":"629b534c42d04f0797980f2d1ed105fdb8906975","status":"affected","versionType":"git"},{"version":"e8784c0aec03a2581ee55827ba694e129d6a57ad","lessThan":"3895780fabd120d0fbd54354014e85207b25687c","status":"affected","versionType":"git"},{"version":"e8784c0aec03a2581ee55827ba694e129d6a57ad","lessThan":"6661befe41009c210efa2c1bcd16a5cc4cff8a06","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/usb/dwc3/dwc3-am62.c"],"versions":[{"version":"5.19","status":"affected"},{"version":"0","lessThan":"5.19","status":"unaffected","versionType":"semver"},{"version":"6.1.84","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.24","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.7.12","lessThanOrEqual":"6.7.*","status":"unaffected","versionType":"semver"},{"version":"6.8.3","lessThanOrEqual":"6.8.*","status":"unaffected","versionType":"semver"},{"version":"6.9","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.19","versionEndExcluding":"6.1.84"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.19","versionEndExcluding":"6.6.24"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.19","versionEndExcluding":"6.7.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.19","versionEndExcluding":"6.8.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.19","versionEndExcluding":"6.9"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/6c6a45645a2e6a272dfde14eddbb6706de63c25d"},{"url":"https://git.kernel.org/stable/c/7dfed9855397d0df4c6f748d1f66547ab3bad766"},{"url":"https://git.kernel.org/stable/c/629b534c42d04f0797980f2d1ed105fdb8906975"},{"url":"https://git.kernel.org/stable/c/3895780fabd120d0fbd54354014e85207b25687c"},{"url":"https://git.kernel.org/stable/c/6661befe41009c210efa2c1bcd16a5cc4cff8a06"}],"title":"usb: dwc3-am62: fix module unload/reload behavior","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-17T14:32:32.392082Z","id":"CVE-2024-26963","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-17T14:32:40.225Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T00:21:05.692Z"},"title":"CVE Program Container","references":[{"url":"https://git.kernel.org/stable/c/6c6a45645a2e6a272dfde14eddbb6706de63c25d","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/7dfed9855397d0df4c6f748d1f66547ab3bad766","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/629b534c42d04f0797980f2d1ed105fdb8906975","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/3895780fabd120d0fbd54354014e85207b25687c","tags":["x_transferred"]},{"url":"https://git.kernel.org/stable/c/6661befe41009c210efa2c1bcd16a5cc4cff8a06","tags":["x_transferred"]}]}]}}