Race condition in Linux kernel - CVE-2026-31728
Published: May 2, 2026
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to cause a denial of service.
The vulnerability exists due to a race condition in the u_ether gadget driver when handling concurrent disconnect and stop operations. A local user can trigger concurrent gether_disconnect() and eth_stop() execution to cause a denial of service.
The issue can lead to a kernel NULL pointer dereference followed by a hardlockup.
How to mitigate CVE-2026-31728
Sources
- https://git.kernel.org/stable/c/6ad77458637b78ec655e3da5f112c862e6690a9d
- https://git.kernel.org/stable/c/8ff689edfeceb5e3ec1623e09af2b2aa0f1098a8
- https://git.kernel.org/stable/c/a259ba0bce3b192c04334499690372a250f7d0b1
- https://git.kernel.org/stable/c/bbb09bb89ffa571475f66daca9482b974cd29d6a
- https://git.kernel.org/stable/c/e1e7a66584bf0aff3becb73c19fa31527889fc9e
- https://git.kernel.org/stable/c/e1eabb072c75681f78312c484ccfffb7430f206e
- https://git.kernel.org/stable/c/f02980594deef751e42133714aee25228f1494c6
- https://git.kernel.org/stable/c/f6813c2b2ae78def76b69e0f9d72f80e4a1c4aca