CVE-2026-43170
Description
In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: gadget: Move vbus draw to workqueue context
Currently dwc3_gadget_vbus_draw() can be called from atomic context, which in turn invokes power-supply-core APIs. And some these PMIC APIs have operations that may sleep, leading to kernel panic.
Fix this by moving the vbus_draw into a workqueue context.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A Linux kernel vulnerability in the dwc3 USB gadget driver allows a kernel panic when vbus_draw is called from atomic context.
Vulnerability
The Linux kernel's dwc3 USB gadget driver contains a bug in the dwc3_gadget_vbus_draw() function. This function can be invoked from atomic context, but it calls power-supply-core APIs that may perform sleeping operations. This mismatch leads to a kernel panic when the driver attempts to draw VBUS power from a PMIC that requires sleeping operations.
Exploitation
An attacker with local access to the system can trigger this vulnerability by causing the USB gadget driver to call dwc3_gadget_vbus_draw() from an atomic context. This could occur during USB state transitions or gadget configuration changes. No special privileges beyond local access are required, but the attacker must be able to interact with the USB gadget subsystem.
Impact
Successful exploitation results in a kernel panic, causing a denial of service (DoS) on the affected system. The system becomes unavailable until rebooted. The CVSS v3 score of 5.5 (Medium) reflects the local attack vector and availability impact.
Mitigation
The fix moves the vbus_draw operation into a workqueue context, ensuring that sleeping operations are not performed in atomic context. The patch has been applied to the Linux kernel stable tree [1][2][3][4]. Users should update to a kernel version containing this fix.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.kernel.org/stable/c/2333653ef854c2cc124077f71a8526f03bf6e06anvdPatch
- git.kernel.org/stable/c/54aaa3b387c2f580a99dc86a9cc2eb6dfaf599a7nvdPatch
- git.kernel.org/stable/c/74a231e3d99d310497ab0ccb359539a6063b316anvdPatch
- git.kernel.org/stable/c/76c1123ffccfaba95cf4ecc2a50f95504a522424nvdPatch
- git.kernel.org/stable/c/a7a80c25b65112768eeba58a7af129d3c52a6d90nvdPatch
News mentions
0No linked articles in our index yet.