CVE-2026-23446

Published: Apr 03, 2026 Last Modified: Apr 03, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

net: usb: aqc111: Do not perform PM inside suspend callback

syzbot reports 'task hung in rpm_resume'

This is caused by aqc111_suspend calling
the PM variant of its write_cmd routine.

The simplified call trace looks like this:

rpm_suspend()
usb_suspend_both() - here udev->dev.power.runtime_status == RPM_SUSPENDING
aqc111_suspend() - called for the usb device interface
aqc111_write32_cmd()
usb_autopm_get_interface()
pm_runtime_resume_and_get()
rpm_resume() - here we call rpm_resume() on our parent
rpm_resume() - Here we wait for a status change that will never happen.

At this point we block another task which holds
rtnl_lock and locks up the whole networking stack.

Fix this by replacing the write_cmd calls with their _nopm variants

https://git.kernel.org/stable/c/069c8f5aebe4d5224cf62acc7d4b3486091c658a
https://git.kernel.org/stable/c/3267bcb744ee8a2feabaa7ab69473f086f67fd71
https://git.kernel.org/stable/c/4de6a43e8ecf961feabddf0e9d6911081d2ed218
https://git.kernel.org/stable/c/621f2f43741b51f62d767eb4752fbcefe2526926
https://git.kernel.org/stable/c/98e8aed64614b0c199d5f0391fbe1a4331cb5773
https://git.kernel.org/stable/c/d3e32a612c6391ca9b7c183aeec22b4fd24c300c