U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2026-31721 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_hid: move list and spinlock inits from bind to alloc There was an issue when you did the following: - setup and bind an hid gadget - open /dev/hidg0 - use the resulting fd in EPOLL_CTL_ADD - unbind the UDC - bind the UDC - use the fd in EPOLL_CTL_DEL When CONFIG_DEBUG_LIST was enabled, a list_del corruption was reported within remove_wait_queue (via ep_remove_wait_queue). After some debugging I found out that the queues, which f_hid registers via poll_wait were the problem. These were initialized using init_waitqueue_head inside hidg_bind. So effectively, the bind function re-initialized the queues while there were still items in them. The solution is to move the initialization from hidg_bind to hidg_alloc to extend their lifetimes to the lifetime of the function instance. Additionally, I found many other possibly problematic init calls in the bind function, which I moved as well.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/13440c0db227c5db01da751ed966dde4cdd2ea18 kernel.org
https://git.kernel.org/stable/c/26a879a41ed960b3fb4ec773ef2788c515c0e488 kernel.org
https://git.kernel.org/stable/c/4e0a88254ad59f6c53a34bf5fa241884ec09e8b2 kernel.org
https://git.kernel.org/stable/c/5d1bb391ceeebb28327703dd07af8c6324af298f kernel.org
https://git.kernel.org/stable/c/81aee4500055876883658b024b6fb61801afe134 kernel.org
https://git.kernel.org/stable/c/8ec6a58586f195a88479edcdb0b8027c39f12d03 kernel.org
https://git.kernel.org/stable/c/de93e0862169b5539e00c2b9980b93fd80c37c0d kernel.org
https://git.kernel.org/stable/c/f7d00ee1c8082c8a134340aaf16d71a27e29c362 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2026-31721
NVD Published Date:
05/01/2026
NVD Last Modified:
05/01/2026
Source:
kernel.org