CVE-2026-43430
Race Condition in Linux Kernel USB Yurex Driver
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| yurex | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's usb: yurex driver. It involves a race condition during the probe process where the 'bbu' member of a descriptor is not properly initialized before submitting a USB Request Block (URB). Because 'bbu' is not set to an uninitialized value before the URB's completion handler sets it, there is a timing window where probing can overwrite data that has already been retrieved.
How can this vulnerability impact me? :
The vulnerability can lead to data corruption or inconsistent data being processed by the usb: yurex driver due to the race condition. This could potentially cause system instability or unexpected behavior when interacting with USB devices handled by this driver.