CVE-2026-43430
Received Received - Intake
Race Condition in Linux Kernel USB Yurex Driver

Publication date: 2026-05-08

Last updated on: 2026-05-08

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: usb: yurex: fix race in probe The bbu member of the descriptor must be set to the value standing for uninitialized values before the URB whose completion handler sets bbu is submitted. Otherwise there is a window during which probing can overwrite already retrieved data.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-08
Last Modified
2026-05-08
Generated
2026-05-09
AI Q&A
2026-05-08
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
yurex linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's usb: yurex driver. It involves a race condition during the probe process where the 'bbu' member of a descriptor is not properly initialized before submitting a USB Request Block (URB). Because 'bbu' is not set to an uninitialized value before the URB's completion handler sets it, there is a timing window where probing can overwrite data that has already been retrieved.


How can this vulnerability impact me? :

The vulnerability can lead to data corruption or inconsistent data being processed by the usb: yurex driver due to the race condition. This could potentially cause system instability or unexpected behavior when interacting with USB devices handled by this driver.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart