CVE-2026-43421
USB Gadget NCM Net Device Lifecycle Fix
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's USB gadget function for network control model (f_ncm). It occurs because the network device (net_device) outlives its parent gadget device during disconnection, which leads to dangling sysfs links and null pointer dereference issues.
Previous attempts to fix this problem either caused regressions related to power management or broke the one-to-one mapping between the function instance and the network device, which affected DHCP server functionality.
The final fix uses device_move to reparent the net_device between the gadget device and /sys/devices/virtual/ during bind and unbind cycles. This preserves the network interface across USB reconnections and allows the DHCP server to maintain its binding.
How can this vulnerability impact me? :
This vulnerability can cause system instability due to null pointer dereferences when the network device outlives its parent gadget device during USB disconnection.
It can also lead to dangling sysfs links, which may cause unexpected behavior or errors in system management tools.
Additionally, improper handling of the network device lifecycle can break DHCP server functionality, potentially disrupting network connectivity on affected systems.