Description
In the Linux kernel, the following vulnerability has been resolved:

wifi: libertas: fix WARNING in usb_tx_block

The function usb_tx_block() submits cardp->tx_urb without ensuring that
any previous transmission on this URB has completed. If a second call
occurs while the URB is still active (e.g. during rapid firmware loading),
usb_submit_urb() detects the active state and triggers a warning:
'URB submitted while active'.

Fix this by enforcing serialization: call usb_kill_urb() before
submitting the new request. This ensures the URB is idle and safe to reuse.
Published: 2026-05-06
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The libertas Wi‑Fi driver in the Linux kernel contains a flaw in usb_tx_block where a USB request block (URB) is submitted without first ensuring that the previous transmission on that URB has completed. Re‑submitting an active URB triggers a warning: "URB submitted while active." This warning indicates a failure to serialize USB traffic and could lead to driver instability or a denial of service if repeated during rapid firmware loading or busy USB activity. No explicit crash or integrity compromise is documented in the advisory; the impact is limited to potential service disruption of the wireless adapter.

Affected Systems

All Linux kernel releases that ship the unpatched libertas Wi‑Fi driver are affected. The advisory does not list specific kernel versions; therefore any distribution distribution or custom kernel that includes the libertas module without the commit that adds usb_kill_urb before usb_submit_urb may be vulnerable.

Risk and Exploitability

The advisory does not provide a CVSS score and the EPSS is not available. The vulnerability is not listed in CISA KEV and no public exploits are known. The risk is primarily limited to repeated warnings that could destabilize the driver under rapid firmware reloads or heavy USB traffic. Patch remains the recommended mitigation.

Generated by OpenCVE AI on May 6, 2026 at 16:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the kernel patch that inserts usb_kill_urb before each usb_submit_urb in usb_tx_block, or upgrade to a Linux kernel version that includes the fix.
  • Reload the libertas Wi‑Fi module or reboot the system to load the patched driver module.
  • Check for firmware updates for the wireless adapter that may mitigate rapid firmware loading and reduce risk of URB re‑submission.

Generated by OpenCVE AI on May 6, 2026 at 16:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 12:15:00 +0000


Wed, 06 May 2026 17:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: wifi: libertas: fix WARNING in usb_tx_block The function usb_tx_block() submits cardp->tx_urb without ensuring that any previous transmission on this URB has completed. If a second call occurs while the URB is still active (e.g. during rapid firmware loading), usb_submit_urb() detects the active state and triggers a warning: 'URB submitted while active'. Fix this by enforcing serialization: call usb_kill_urb() before submitting the new request. This ensures the URB is idle and safe to reuse.
Title wifi: libertas: fix WARNING in usb_tx_block
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:28:44.522Z

Reserved: 2026-05-01T14:12:55.996Z

Link: CVE-2026-43255

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:46.263

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43255

cve-icon Redhat

Severity :

Publid Date: 2026-05-06T00:00:00Z

Links: CVE-2026-43255 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T18:30:09Z

Weaknesses