Home

Description

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: u_ether: Fix race between gether_disconnect and eth_stop A race condition between gether_disconnect() and eth_stop() leads to a NULL pointer dereference. Specifically, if eth_stop() is triggered concurrently while gether_disconnect() is tearing down the endpoints, eth_stop() attempts to access the cleared endpoint descriptor, causing the following NPE: Unable to handle kernel NULL pointer dereference Call trace: __dwc3_gadget_ep_enable+0x60/0x788 dwc3_gadget_ep_enable+0x70/0xe4 usb_ep_enable+0x60/0x15c eth_stop+0xb8/0x108 Because eth_stop() crashes while holding the dev->lock, the thread running gether_disconnect() fails to acquire the same lock and spins forever, resulting in a hardlockup: Core - Debugging Information for Hardlockup core(7) Call trace: queued_spin_lock_slowpath+0x94/0x488 _raw_spin_lock+0x64/0x6c gether_disconnect+0x19c/0x1e8 ncm_set_alt+0x68/0x1a0 composite_setup+0x6a0/0xc50 The root cause is that the clearing of dev->port_usb in gether_disconnect() is delayed until the end of the function. Move the clearing of dev->port_usb to the very beginning of gether_disconnect() while holding dev->lock. This cuts off the link immediately, ensuring eth_stop() will see dev->port_usb as NULL and safely bail out.

PUBLISHED Reserved 2026-03-09 | Published 2026-05-01 | Updated 2026-05-01 | Assigner Linux

Product status

Default status
unaffected

2b3d942c4878084a37991a65e66512c02b8fa2ad (git) before f02980594deef751e42133714aee25228f1494c6
affected

2b3d942c4878084a37991a65e66512c02b8fa2ad (git) before e1e7a66584bf0aff3becb73c19fa31527889fc9e
affected

2b3d942c4878084a37991a65e66512c02b8fa2ad (git) before a259ba0bce3b192c04334499690372a250f7d0b1
affected

2b3d942c4878084a37991a65e66512c02b8fa2ad (git) before f6813c2b2ae78def76b69e0f9d72f80e4a1c4aca
affected

2b3d942c4878084a37991a65e66512c02b8fa2ad (git) before bbb09bb89ffa571475f66daca9482b974cd29d6a
affected

2b3d942c4878084a37991a65e66512c02b8fa2ad (git) before 6ad77458637b78ec655e3da5f112c862e6690a9d
affected

2b3d942c4878084a37991a65e66512c02b8fa2ad (git) before 8ff689edfeceb5e3ec1623e09af2b2aa0f1098a8
affected

2b3d942c4878084a37991a65e66512c02b8fa2ad (git) before e1eabb072c75681f78312c484ccfffb7430f206e
affected

Default status
affected

2.6.27
affected

Any version before 2.6.27
unaffected

5.10.253 (semver)
unaffected

5.15.203 (semver)
unaffected

6.1.169 (semver)
unaffected

6.6.134 (semver)
unaffected

6.12.81 (semver)
unaffected

6.18.22 (semver)
unaffected

6.19.12 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/f02980594deef751e42133714aee25228f1494c6

git.kernel.org/...c/e1e7a66584bf0aff3becb73c19fa31527889fc9e

git.kernel.org/...c/a259ba0bce3b192c04334499690372a250f7d0b1

git.kernel.org/...c/f6813c2b2ae78def76b69e0f9d72f80e4a1c4aca

git.kernel.org/...c/bbb09bb89ffa571475f66daca9482b974cd29d6a

git.kernel.org/...c/6ad77458637b78ec655e3da5f112c862e6690a9d

git.kernel.org/...c/8ff689edfeceb5e3ec1623e09af2b2aa0f1098a8

git.kernel.org/...c/e1eabb072c75681f78312c484ccfffb7430f206e

cve.org (CVE-2026-31728)

nvd.nist.gov (CVE-2026-31728)

Download JSON