CVE-2026-43170

Published: Mag 06, 2026 Last Modified: Mag 06, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: gadget: Move vbus draw to workqueue context

Currently dwc3_gadget_vbus_draw() can be called from atomic
context, which in turn invokes power-supply-core APIs. And
some these PMIC APIs have operations that may sleep, leading
to kernel panic.

Fix this by moving the vbus_draw into a workqueue context.

https://git.kernel.org/stable/c/2333653ef854c2cc124077f71a8526f03bf6e06a
https://git.kernel.org/stable/c/54aaa3b387c2f580a99dc86a9cc2eb6dfaf599a7
https://git.kernel.org/stable/c/74a231e3d99d310497ab0ccb359539a6063b316a
https://git.kernel.org/stable/c/76c1123ffccfaba95cf4ecc2a50f95504a522424
https://git.kernel.org/stable/c/a7a80c25b65112768eeba58a7af129d3c52a6d90