CVE-2026-43324
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/05/2026
Last modified:
15/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
USB: dummy-hcd: Fix interrupt synchronization error<br />
<br />
This fixes an error in synchronization in the dummy-hcd driver. The<br />
error has a somewhat involved history. The synchronization mechanism<br />
was introduced by commit 7dbd8f4cabd9 ("USB: dummy-hcd: Fix erroneous<br />
synchronization change"), which added an emulated "interrupts enabled"<br />
flag together with code emulating synchronize_irq() (it waits until<br />
all current handler callbacks have returned).<br />
<br />
But the emulated interrupt-disable occurred too late, after the driver<br />
containing the handler callback routines had been told that it was<br />
unbound and no more callbacks would occur. Commit 4a5d797a9f9c ("usb:<br />
gadget: dummy_hcd: fix gpf in gadget_setup") tried to fix this by<br />
moving the synchronize_irq() emulation code from dummy_stop() to<br />
dummy_pullup(), which runs before the unbind callback.<br />
<br />
There still were races, though, because the emulated interrupt-disable<br />
still occurred too late. It couldn&#39;t be moved to dummy_pullup(),<br />
because that routine can be called for reasons other than an impending<br />
unbind. Therefore commits 7dc0c55e9f30 ("USB: UDC core: Add<br />
udc_async_callbacks gadget op") and 04145a03db9d ("USB: UDC: Implement<br />
udc_async_callbacks in dummy-hcd") added an API allowing the UDC core<br />
to tell dummy-hcd exactly when emulated interrupts and their callbacks<br />
should be disabled.<br />
<br />
That brings us to the current state of things, which is still wrong<br />
because the emulated synchronize_irq() occurs before the emulated<br />
interrupt-disable! That&#39;s no good, beause it means that more emulated<br />
interrupts can occur after the synchronize_irq() emulation has run,<br />
leading to the possibility that a callback handler may be running when<br />
the gadget driver is unbound.<br />
<br />
To fix this, we have to move the synchronize_irq() emulation code yet<br />
again, to the dummy_udc_async_callbacks() routine, which takes care of<br />
enabling and disabling emulated interrupt requests. The<br />
synchronization will now run immediately after emulated interrupts are<br />
disabled, which is where it belongs.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.14 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.81 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2ca9e46f8f1f5a297eb0ac83f79d35d5b3a02541
- https://git.kernel.org/stable/c/5687a09776069bd915560021c9728ca528440128
- https://git.kernel.org/stable/c/5aa776c8615bea3b1eaeec87b0788375800ead4f
- https://git.kernel.org/stable/c/8bcd80219d8e10e660bf29b20e41bb8beb4e4cb7
- https://git.kernel.org/stable/c/94d4fab1dd9e64f45449bcc7d6a5acf796b13015
- https://git.kernel.org/stable/c/cbf7df5e5d27cd5bea92ee9a75a4b28dbcc718d4
- https://git.kernel.org/stable/c/d847f375b1bcea713143bc02720d13d2d01b012a



