Description
In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_rndis: Protect RNDIS options with mutex

The class/subclass/protocol options are suspectible to race conditions
as they can be accessed concurrently through configfs.

Use existing mutex to protect these options. This issue was identified
during code inspection.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel’s RNDIS gadget driver contains a race condition that allows concurrent modification of class, subclass, and protocol options via configfs. This flaw can lead to corrupted data structures or inadvertent crashes within the driver loop, potentially resulting in a local denial of service or system instability. The vulnerability arises from insufficient synchronization when accessing these options during configuration operations.

Affected Systems

All versions of the Linux kernel that expose the RNDIS gadget driver through configfs are potentially affected until the patch that introduces a mutex is applied. No specific kernel releases are listed, so the risk applies broadly to any unpatched device using the RNDIS gadget interface.

Risk and Exploitability

The flaw is a local race condition; it requires an attacker with write access to the configfs interface to trigger concurrent changes. While no CVSS score is provided, the lack of a remote trigger and the need for privileged configuration operations suggest a moderate risk. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog. The exploit would involve orchestrating simultaneous writes to the RNDIS option configuration, leading to possible driver instability.

Generated by OpenCVE AI on May 9, 2026 at 01:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that contains the mutex protection for RNDIS gadget options
  • Ensure that writes to the configfs RNDIS option entries are restricted to privileged users and monitored for abnormal activity
  • If an immediate kernel upgrade is infeasible, consider disabling the RNDIS gadget driver or remounting configfs with readonly permissions for non‑privileged users

Generated by OpenCVE AI on May 9, 2026 at 01:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362

Fri, 08 May 2026 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_rndis: Protect RNDIS options with mutex The class/subclass/protocol options are suspectible to race conditions as they can be accessed concurrently through configfs. Use existing mutex to protect these options. This issue was identified during code inspection.
Title usb: gadget: f_rndis: Protect RNDIS options with mutex
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:37:19.920Z

Reserved: 2026-05-01T14:12:56.003Z

Link: CVE-2026-43342

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:44.170

Modified: 2026-05-08T14:16:44.170

Link: CVE-2026-43342

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43342 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T01:45:22Z

Weaknesses