Improper control of a resource through its lifetime in Linux kernel - CVE-2026-31754
Published: May 2, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to improper state management in the cdns3 gadget role-switch handling when switching from a failed gadget initialization to host mode via sysfs. A local user can trigger a role switch after gadget startup failure to cause a denial of service.
The issue can result in a synchronous external abort in xhci_gen_setup() during host controller setup.
How to mitigate CVE-2026-31754
Sources
- https://git.kernel.org/stable/c/5a85599ca4d2584d89dc69f4fc49303b75a42338
- https://git.kernel.org/stable/c/9b1d301fbae837bf6979a19030b81d869bb15f7a
- https://git.kernel.org/stable/c/b490f0e477d26d29ed51e5dc47e3b9bd31bcb49f
- https://git.kernel.org/stable/c/c32f8748d70c8fc77676ad92ed76cede17bf2c48
- https://git.kernel.org/stable/c/c7e475ae3a5593c5db21b3b7dca4ba8bdac9b47f
- https://git.kernel.org/stable/c/cfca84f5986afceb63a3adf39d4a98e915aebbc2
- https://git.kernel.org/stable/c/fb7110a052467098967284ef14d306810b354937