CVE-2026-31758
Published: Fri, 01 May 2026 15:16
Summary
In the Linux kernel, the following vulnerability has been resolved: usb: usbtmc: Flush anchored URBs in usbtmc_release When calling usbtmc_release, pending anchored URBs must be flushed or killed to
Details
In the Linux kernel, the following vulnerability has been resolved: usb: usbtmc: Flush anchored URBs in usbtmc_release When calling usbtmc_release, pending anchored URBs must be flushed or killed to prevent use-after-free errors (e.g. in the HCD giveback path). Call usbtmc_draw_down() to allow anchored URBs to be completed.
Are YOU affected by CVE-2026-31758?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-31758 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/7fa8f61bab3fb75b5deba8a0f3abb74dc5068d9f
- https://git.kernel.org/stable/c/8a768552f7a8276fb9e01d49773d2094ace7c8f1
- https://git.kernel.org/stable/c/959ef329071136e4335b54822fe2f607659b4569
- https://git.kernel.org/stable/c/95e09b07e50290254b28b8395509473104518f8c
- https://git.kernel.org/stable/c/977b632db51d231dec0bc571089a5c2402674139
- https://git.kernel.org/stable/c/d13318dec0c1e0e2ac16f8ecbd522db14cea4bb1
- https://git.kernel.org/stable/c/d40198de50232e04c14c6e2092e896766c95ea48
- https://git.kernel.org/stable/c/e189d443767f7cd390c52f2e122e1fc41c7562d6
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.