Description
In the Linux kernel, the following vulnerability has been resolved:

net: usb: pegasus: enable basic endpoint checking

pegasus_probe() fills URBs with hardcoded endpoint pipes without
verifying the endpoint descriptors:

- usb_rcvbulkpipe(dev, 1) for RX data
- usb_sndbulkpipe(dev, 2) for TX data
- usb_rcvintpipe(dev, 3) for status interrupts

A malformed USB device can present these endpoints with transfer types
that differ from what the driver assumes.

Add a pegasus_usb_ep enum for endpoint numbers, replacing magic
constants throughout. Add usb_check_bulk_endpoints() and
usb_check_int_endpoints() calls before any resource allocation to
verify endpoint types before use, rejecting devices with mismatched
descriptors at probe time, and avoid triggering assertion.

Similar fix to
- commit 90b7f2961798 ("net: usb: rtl8150: enable basic endpoint checking")
- commit 9e7021d2aeae ("net: usb: catc: enable basic endpoint checking")
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel the Pegasus USB driver constructs URBs using hard‑coded endpoint numbers without validating the endpoint descriptors supplied by the device. A malicious or malformed USB device can advertise an endpoint with a transfer type that does not match the driver’s expectation, potentially causing an assertion failure or kernel crash when the URB is processed. This leads to a denial of service on the host system.

Affected Systems

The vulnerability affects all Linux kernel releases that include the Pegasus USB driver, as well as other similar drivers that performed the same unchecked endpoint assignment. The patch is present in the upstream 6.x series; any kernel version prior to the merge of the relevant commits is vulnerable.

Risk and Exploitability

The absence of EPSS data makes quantifying the likelihood difficult, but the flaw can be exercised simply by connecting a crafted USB device to the host. The impact is a kernel crash or instability, and the vulnerability is local in that it requires physical access to the machine. While it is not listed in CISA’s KEV catalog, an affected system could be exposed to DoS attacks in environments where USB polling is common. Administrators should treat this as a moderate‑to‑high risk and act promptly.

Generated by OpenCVE AI on May 6, 2026 at 13:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a release that includes the Pegasus endpoint‑checking patch or backport the patch from upstream and rebuild the kernel.
  • If updating is not possible, apply the patch directly to the running kernel source tree, rebuild the driver module, and reload it.
  • As a temporary workaround, blacklist the pegasus driver using a modprobe.d conf file or restrict USB device insertion with udev rules.

Generated by OpenCVE AI on May 6, 2026 at 13:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 14:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: usb: pegasus: enable basic endpoint checking pegasus_probe() fills URBs with hardcoded endpoint pipes without verifying the endpoint descriptors: - usb_rcvbulkpipe(dev, 1) for RX data - usb_sndbulkpipe(dev, 2) for TX data - usb_rcvintpipe(dev, 3) for status interrupts A malformed USB device can present these endpoints with transfer types that differ from what the driver assumes. Add a pegasus_usb_ep enum for endpoint numbers, replacing magic constants throughout. Add usb_check_bulk_endpoints() and usb_check_int_endpoints() calls before any resource allocation to verify endpoint types before use, rejecting devices with mismatched descriptors at probe time, and avoid triggering assertion. Similar fix to - commit 90b7f2961798 ("net: usb: rtl8150: enable basic endpoint checking") - commit 9e7021d2aeae ("net: usb: catc: enable basic endpoint checking")
Title net: usb: pegasus: enable basic endpoint checking
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:36.491Z

Reserved: 2026-05-01T14:12:55.989Z

Link: CVE-2026-43156

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:33.427

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43156

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T16:00:06Z

Weaknesses