The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-31728

CVE-2026-31728: Linux Kernel Race Condition Vulnerability

CVE-2026-31728 is a race condition flaw in the Linux Kernel USB gadget subsystem that causes NULL pointer dereference and hardlockup. This article covers the technical details, affected versions, and mitigation strategies.

Published: May 7, 2026

CVE-2026-31728 Overview

CVE-2026-31728 is a race condition vulnerability in the Linux kernel's USB gadget u_ether driver. The flaw occurs between gether_disconnect() and eth_stop(), leading to a NULL pointer dereference and a subsequent kernel hardlockup. When eth_stop() runs concurrently with gether_disconnect() tearing down endpoints, it accesses a cleared endpoint descriptor while holding dev->lock. The crash leaves the lock held, causing gether_disconnect() to spin forever and deadlock the core. The issue is classified under [CWE-362] (Concurrent Execution using Shared Resource with Improper Synchronization) and affects systems using the USB Ethernet gadget functionality, including NCM (Network Control Model) configurations.

Critical Impact

A local attacker triggering USB gadget reconfiguration during teardown can cause a kernel hardlockup, resulting in denial of service on the affected host.

Affected Products

  • Linux Kernel (multiple stable branches prior to the fix)
  • Linux Kernel 7.0 release candidates rc1 through rc6
  • Systems using the USB gadget u_ether driver with functions such as NCM

Discovery Timeline

  • 2026-05-01 - CVE-2026-31728 published to NVD
  • 2026-05-07 - Last updated in NVD database

Technical Details for CVE-2026-31728

Vulnerability Analysis

The vulnerability resides in drivers/usb/gadget/function/u_ether.c. The u_ether driver provides Ethernet-over-USB functionality used by gadget functions like NCM, ECM, and RNDIS. Two code paths can run concurrently against the same eth_dev structure: the network stack invoking eth_stop() to bring the interface down, and the USB composite layer invoking gether_disconnect() when an alternate setting changes.

gether_disconnect() clears the endpoint descriptors as part of tearing down the link, but only resets dev->port_usb to NULL at the end of the function. During this window, eth_stop() observes a non-NULL dev->port_usb and proceeds to call usb_ep_enable() on an endpoint whose descriptor has already been cleared. This dereferences a NULL pointer inside __dwc3_gadget_ep_enable() on DesignWare USB3 controllers.

Root Cause

The root cause is delayed clearing of the dev->port_usb pointer in gether_disconnect(). The cleanup ordering allows eth_stop() to observe a stale link reference while endpoint descriptors are already invalid. Because eth_stop() crashes while holding dev->lock, the spinlock is never released. The thread executing gether_disconnect() then spins on _raw_spin_lock() indefinitely, producing a hardlockup observable in composite_setup() and ncm_set_alt() call paths.

Attack Vector

Exploitation requires local access on a system exposing the USB gadget interface. An attacker with the ability to bring the network interface up and down while triggering USB configuration changes (such as alternate setting selection on an NCM function) can race the two code paths. Successful exploitation produces a kernel NULL pointer dereference followed by a hardlockup, denying service to the affected core or system. The CVSS vector indicates the attack requires local access, low privileges, and high attack complexity due to the timing window required to win the race.

No public exploit code or proof-of-concept is available for this vulnerability. The fix relocates the clearing of dev->port_usb to the start of gether_disconnect() under dev->lock, ensuring eth_stop() observes a NULL pointer and bails out safely.

Detection Methods for CVE-2026-31728

Indicators of Compromise

  • Kernel panic logs containing Unable to handle kernel NULL pointer dereference with a call trace through __dwc3_gadget_ep_enable, usb_ep_enable, and eth_stop.
  • Hardlockup watchdog messages with stack traces showing queued_spin_lock_slowpath followed by gether_disconnect and ncm_set_alt.
  • Unexpected system or core hangs correlated with USB gadget reconfiguration events.

Detection Strategies

  • Monitor /var/log/kern.log and dmesg output for NULL pointer dereferences originating in u_ether.c or dwc3 gadget code paths.
  • Audit running kernel versions against the patched commits listed in the kernel.org stable tree advisories to identify unpatched hosts.
  • Correlate USB device disconnect events with kernel oops or soft lockup messages on systems running gadget mode.

Monitoring Recommendations

  • Enable kernel.hardlockup_panic and kernel.softlockup_panic sysctls to surface hangs deterministically for incident triage.
  • Forward kernel logs to a centralized SIEM and alert on signatures referencing gether_disconnect, eth_stop, or __dwc3_gadget_ep_enable faults.
  • Track kernel package versions across the fleet to verify patch deployment status.

How to Mitigate CVE-2026-31728

Immediate Actions Required

  • Apply the upstream kernel patches referenced in the kernel.org stable tree commits, including f6813c2b2ae78def76b69e0f9d72f80e4a1c4aca and the corresponding stable backports.
  • Update to a Linux kernel build that incorporates the fix moving dev->port_usb clearing to the start of gether_disconnect().
  • Restrict local access to systems running USB gadget mode and limit which users can manipulate network interfaces or USB function configurations.

Patch Information

The fix has been merged into the mainline Linux kernel and backported to multiple stable branches. Refer to the Linux kernel stable commit f6813c2b and related backports including commit 6ad77458, commit a259ba0b, and commit e1eabb07. Distribution-specific kernel updates should be tracked through vendor advisories.

Workarounds

  • Disable or unload the u_ether and dependent gadget function modules (such as usb_f_ncm) on systems where USB gadget Ethernet is not required.
  • Avoid scripted or automated workflows that rapidly toggle the gadget Ethernet interface up and down while reconfiguring USB functions.
  • Restrict CAP_NET_ADMIN and access to gadget configfs paths to trusted administrators only.
bash
# Check current kernel version and verify patch status
uname -r

# Unload u_ether-dependent modules if gadget Ethernet is not required
sudo modprobe -r usb_f_ncm
sudo modprobe -r u_ether

# Enable hardlockup detection to surface this class of issue
sudo sysctl -w kernel.hardlockup_panic=1
sudo sysctl -w kernel.softlockup_panic=1

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRace Condition

  • Vendor/TechLinux

  • SeverityMEDIUM

  • CVSS Score4.7

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-362
  • Vendor Resources
  • Kernel Git Commit Log

  • Kernel Git Commit Log

  • Kernel Git Commit Log

  • Kernel Git Commit Log

  • Kernel Git Commit Log

  • Kernel Git Commit Log

  • Kernel Git Commit Log

  • Kernel Git Commit Log
  • Related CVEs
  • CVE-2026-43255: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31563: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31551: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31667: Linux Kernel Race Condition Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English