usb: dwc3: gadget: Move vbus draw to workqueue context
Summary
| CVE | CVE-2026-43170 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-06 12:16:35 UTC |
| Updated | 2026-05-06 13:07:51 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
usb: dwc3: gadget: Move vbus draw to workqueue context
Currently dwc3_gadget_vbus_draw() can be called from atomic
context, which in turn invokes power-supply-core APIs. And
some these PMIC APIs have operations that may sleep, leading
to kernel panic.
Fix this by moving the vbus_draw into a workqueue context. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 99288de36020c5a6976df77e53ac449b0f75c97f 76c1123ffccfaba95cf4ecc2a50f95504a522424 git |
Not specified |
| CNA |
Linux |
Linux |
affected 99288de36020c5a6976df77e53ac449b0f75c97f a7a80c25b65112768eeba58a7af129d3c52a6d90 git |
Not specified |
| CNA |
Linux |
Linux |
affected 99288de36020c5a6976df77e53ac449b0f75c97f 2333653ef854c2cc124077f71a8526f03bf6e06a git |
Not specified |
| CNA |
Linux |
Linux |
affected 99288de36020c5a6976df77e53ac449b0f75c97f 74a231e3d99d310497ab0ccb359539a6063b316a git |
Not specified |
| CNA |
Linux |
Linux |
affected 99288de36020c5a6976df77e53ac449b0f75c97f 54aaa3b387c2f580a99dc86a9cc2eb6dfaf599a7 git |
Not specified |
| CNA |
Linux |
Linux |
affected 5.13 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.13 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.128 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.75 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.16 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.6 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/76c1123ffccfaba95cf4ecc2a50f95504a522424 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/2333653ef854c2cc124077f71a8526f03bf6e06a |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/54aaa3b387c2f580a99dc86a9cc2eb6dfaf599a7 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/74a231e3d99d310497ab0ccb359539a6063b316a |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/a7a80c25b65112768eeba58a7af129d3c52a6d90 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.