CVE-2026-43324
USB: dummy-hcd Interrupt Synchronization Error Fix
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an interrupt synchronization error in the Linux kernel's dummy-hcd USB driver. The issue arises because the emulated interrupt-disable mechanism occurs too late, after the driver has been unbound, allowing interrupt callbacks to still run. This improper timing can cause race conditions where callbacks execute when they should not, potentially leading to unstable or unexpected behavior.
The problem stems from the synchronization code being placed incorrectly in the driver lifecycle. Previous fixes moved the synchronization code around, but it still ran before interrupts were fully disabled, allowing more interrupts and callbacks to occur after synchronization. The final fix moves the synchronization to a routine that properly disables interrupts before synchronizing, ensuring no callbacks run after unbinding.
How can this vulnerability impact me? :
This vulnerability can lead to race conditions in the USB dummy-hcd driver where interrupt callbacks may run after the driver has been unbound. This can cause instability or unexpected behavior in the system, potentially leading to crashes or other erratic USB device behavior.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by updating the Linux kernel to a version that includes the patch for the dummy-hcd driver synchronization error.
Since the issue involves the USB dummy-hcd driver and its interrupt synchronization, applying the latest kernel updates from your Linux distribution that address this specific fix is the recommended immediate mitigation step.