CVE-2026-43327
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
08/05/2026
Last modified:
15/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
USB: dummy-hcd: Fix locking/synchronization error<br />
<br />
Syzbot testing was able to provoke an addressing exception and crash<br />
in the usb_gadget_udc_reset() routine in<br />
drivers/usb/gadgets/udc/core.c, resulting from the fact that the<br />
routine was called with a second ("driver") argument of NULL. The bad<br />
caller was set_link_state() in dummy_hcd.c, and the problem arose<br />
because of a race between a USB reset and driver unbind.<br />
<br />
These sorts of races were not supposed to be possible; commit<br />
7dbd8f4cabd9 ("USB: dummy-hcd: Fix erroneous synchronization change"),<br />
along with a few followup commits, was written specifically to prevent<br />
them. As it turns out, there are (at least) two errors remaining in<br />
the code. Another patch will address the second error; this one is<br />
concerned with the first.<br />
<br />
The error responsible for the syzbot crash occurred because the<br />
stop_activity() routine will sometimes drop and then re-acquire the<br />
dum->lock spinlock. A call to stop_activity() occurs in<br />
set_link_state() when handling an emulated USB reset, after the test<br />
of dum->ints_enabled and before the increment of dum->callback_usage.<br />
This allowed another thread (doing a driver unbind) to sneak in and<br />
grab the spinlock, and then clear dum->ints_enabled and dum->driver.<br />
Normally this other thread would have to wait for dum->callback_usage<br />
to go down to 0 before it would clear dum->driver, but in this case it<br />
didn&#39;t have to wait since dum->callback_usage had not yet been<br />
incremented.<br />
<br />
The fix is to increment dum->callback_usage _before_ calling<br />
stop_activity() instead of after. Then the thread doing the unbind<br />
will not clear dum->driver until after the call to<br />
usb_gadget_udc_reset() safely returns and dum->callback_usage has been<br />
decremented again.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.2.97 (including) | 3.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.16.52 (including) | 3.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.1.46 (including) | 4.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.4.92 (including) | 4.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9.55 (including) | 4.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.14 (including) | 5.10.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.81 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/218886b2ef2dea7627d3700ab0abaf4bf9d1161f
- https://git.kernel.org/stable/c/616a63ff495df12863692ab3f9f7b84e3fa7a66d
- https://git.kernel.org/stable/c/6350c7dd33ab481ef41c931a238361490c32d15c
- https://git.kernel.org/stable/c/69ab97a693251d6a6093e630060a3c744fd58524
- https://git.kernel.org/stable/c/791966f85b439b261bf19865cf1c07c065ffb4b4
- https://git.kernel.org/stable/c/805b1833d6ed6da5086e610578a28e71bb54fbbb
- https://git.kernel.org/stable/c/cc97fb5969177cccce2e23b31298df220fc7570d
- https://git.kernel.org/stable/c/efbd9441f1e769a7aae1813d497cec09cbdff031



