Description
In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: renesas_usb3: validate endpoint index in standard request handlers

The GET_STATUS and SET/CLEAR_FEATURE handlers extract the endpoint
number from the host-supplied wIndex without any sort of validation.
Fix this up by validating the number of endpoints actually match up with
the number the device has before attempting to dereference a pointer
based on this math.

This is just like what was done in commit ee0d382feb44 ("usb: gadget:
aspeed_udc: validate endpoint index for ast udc") for the aspeed driver.
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (kernel crash)
Action: Patch immediately
AI Analysis

Impact

The vulnerability exists in the Renesas USB3 gadget driver. The GET_STATUS and SET/CLEAR_FEATURE request handlers extract the endpoint number from the host‑supplied wIndex without validating that the number of endpoints matches the device’s actual count. This oversight can cause a pointer dereference in kernel space based on an out‑of‑range index, leading to a kernel panic or other crash. The result is a loss of the gadget’s functionality and a denial of service to the device.

Affected Systems

All Linux kernel distributions that ship the renesas_usb3 gadget driver are affected. The flaw applies to kernel releases prior to the commit that introduces endpoint index validation; specific affected kernel versions are not enumerated in the advisory.

Risk and Exploitability

The CVSS score of 5.5 places this issue in the medium severity range. The EPSS score is below 1 %, indicating a low likelihood that this vulnerability will be exploited in the wild. It is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker could trigger the flaw by sending a USB control request with an invalid wIndex value to the gadget device from a USB host; a successful exploit would cause a kernel crash and a temporary loss of the device’s functionality.

Generated by OpenCVE AI on April 29, 2026 at 01:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the kernel patch that validates the endpoint index before dereferencing the control‑transfer buffer, thereby correcting the index‑out‑of‑bounds bug (CWE‑1285) and preventing null pointer dereferences (CWE‑476).
  • If an immediate kernel upgrade is not feasible, temporarily disable the Renesas USB3 gadget driver or disconnect the device from USB hosts until the patch is applied to mitigate the risk of out‑of‑bounds dereferences.
  • Add a module blacklist entry (for example, /etc/modprobe.d/blacklist-renesas_usb3.conf) to prevent automatic loading of the renesas_usb3 driver when the gadget functionality is not required, thereby reducing exposure to the index validation flaw.

Generated by OpenCVE AI on April 29, 2026 at 01:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6238-1 linux security update
History

Tue, 28 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Mon, 27 Apr 2026 14:15:00 +0000


Mon, 27 Apr 2026 11:30:00 +0000


Sat, 25 Apr 2026 00:15:00 +0000


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: usb: gadget: renesas_usb3: validate endpoint index in standard request handlers The GET_STATUS and SET/CLEAR_FEATURE handlers extract the endpoint number from the host-supplied wIndex without any sort of validation. Fix this up by validating the number of endpoints actually match up with the number the device has before attempting to dereference a pointer based on this math. This is just like what was done in commit ee0d382feb44 ("usb: gadget: aspeed_udc: validate endpoint index for ast udc") for the aspeed driver.
Title usb: gadget: renesas_usb3: validate endpoint index in standard request handlers
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:12:13.975Z

Reserved: 2026-03-09T15:48:24.123Z

Link: CVE-2026-31615

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:40.767

Modified: 2026-04-28T17:29:26.373

Link: CVE-2026-31615

cve-icon Redhat

Severity :

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31615 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T01:45:26Z

Weaknesses