NULL pointer dereference in Linux kernel - CVE-2026-31726
Published: May 2, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to a race condition leading to a NULL pointer dereference in the uvc gadget driver release and disconnect paths when resuming or aborting a suspend during gadget unbind. A local user can trigger a power management transition during device unbind to cause a denial of service.
The issue occurs because freezing user space processes can abort the unbind wait early, after which the V4L2 release path may access a nullified gadget pointer.
How to mitigate CVE-2026-31726
Sources
- https://git.kernel.org/stable/c/0587de744615628c38e33ddc1601160a5ea8c50a
- https://git.kernel.org/stable/c/0c00ec409d7b2bce3fcac73188b79a141db7cfda
- https://git.kernel.org/stable/c/1aa9356881ee4ed414bf72d0c56d915492cb5345
- https://git.kernel.org/stable/c/8a1128d604c360eca135f15b882b70256a522145
- https://git.kernel.org/stable/c/c038ba56b92e410d1caec22b2dc68780a0b42091
- https://git.kernel.org/stable/c/c78e463ee134b4669579d453c81ae00795e4c19a
- https://git.kernel.org/stable/c/d92d1532e05b1b31d36d48765e43bf73d793d19f
- https://git.kernel.org/stable/c/eba2936bbe6b752a31725a9eb5c674ecbf21ee7d