{"id":"CVE-2024-42085","summary":"usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock\n\nWhen config CONFIG_USB_DWC3_DUAL_ROLE is selected, and trigger system\nto enter suspend status with below command:\necho mem \u003e /sys/power/state\nThere will be a deadlock issue occurring. Detailed invoking path as\nbelow:\ndwc3_suspend_common()\n    spin_lock_irqsave(&dwc-\u003elock, flags);              \u003c-- 1st\n    dwc3_gadget_suspend(dwc);\n        dwc3_gadget_soft_disconnect(dwc);\n            spin_lock_irqsave(&dwc-\u003elock, flags);      \u003c-- 2nd\nThis issue is exposed by commit c7ebd8149ee5 (\"usb: dwc3: gadget: Fix\nNULL pointer dereference in dwc3_gadget_suspend\") that removes the code\nof checking whether dwc-\u003egadget_driver is NULL or not. It causes the\nfollowing code is executed and deadlock occurs when trying to get the\nspinlock. In fact, the root cause is the commit 5265397f9442(\"usb: dwc3:\nRemove DWC3 locking during gadget suspend/resume\") that forgot to remove\nthe lock of otg mode. So, remove the redundant lock of otg mode during\ngadget suspend/resume.","modified":"2026-04-02T12:17:42.557822Z","published":"2024-07-29T16:26:26.284Z","related":["SUSE-SU-2024:3190-1","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3209-1","SUSE-SU-2024:3383-1","SUSE-SU-2024:3483-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42085.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/17e2956633ca560b95f1cbbb297cfc2adf650649"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7026576e89094aa9a0062aa6d10cba18aa99944c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7838de15bb700c2898a7d741db9b1f3cbc86c136"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8731a0b180f6b5d52397c7aeea6eda9511a467a7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d77e2b5104c51d3668b9717c825a4a06998efe63"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f1274cfab183e69a7c7bafffcb4f50703c876276"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/42xxx/CVE-2024-42085.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-42085"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"f2bfd0a2a640ca2f308b6893a89cfb2ec31e8fde"},{"fixed":"8731a0b180f6b5d52397c7aeea6eda9511a467a7"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2fa487a9466760a4fb6f147aed6219379dabfc2e"},{"fixed":"7026576e89094aa9a0062aa6d10cba18aa99944c"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"5265397f94424eaea596026fd34dc7acf474dcec"},{"fixed":"d77e2b5104c51d3668b9717c825a4a06998efe63"},{"fixed":"17e2956633ca560b95f1cbbb297cfc2adf650649"},{"fixed":"f1274cfab183e69a7c7bafffcb4f50703c876276"},{"fixed":"7838de15bb700c2898a7d741db9b1f3cbc86c136"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-42085.json"}}],"schema_version":"1.7.5"}