Description
In the Linux kernel, the following vulnerability has been resolved:

usb: image: mdc800: kill download URB on timeout

mdc800_device_read() submits download_urb and waits for completion.
If the timeout fires and the device has not responded, the function
returns without killing the URB, leaving it active.

A subsequent read() resubmits the same URB while it is still
in-flight, triggering the WARN in usb_submit_urb():

"URB submitted while active"

Check the return value of wait_event_timeout() and kill the URB if
it indicates timeout, ensuring the URB is complete before its status
is inspected or the URB is resubmitted.

Similar to
- commit 372c93131998 ("USB: yurex: fix control-URB timeout handling")
- commit b98d5000c505 ("media: rc: iguanair: handle timeouts")
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The mdc800 USB driver has a flaw where a download URB is not cancelled after a timeout. As a result, the driver may leave an active URB in the system, and a subsequent read() will attempt to resubmit the same URB. This triggers the kernel warning "URB submitted while active" and indicates that resources that should have been released remain allocated, potentially leading to a resource leak within the USB subsystem. The flaw is associated with the CWE-400 category of uncontrolled resource consumption.

Affected Systems

All Linux kernel builds that contain the unpatched mdc800 driver are affected. This includes any kernel that has not integrated the patch commit adding timeout handling. No specific kernel version is listed, so all kernels compiled with the vulnerable code prior to the fix are included.

Risk and Exploitability

The flaw appears to require local access to a USB mdc800 device that does not respond. No public exploit code is known, and the vulnerability is not listed in the CISA KEV catalog. The EPSS score is not available, so the likelihood of exploitation remains uncertain. In a scenario where an attacker can supply a non‑responsive USB device, the warning could be repeatedly triggered, but no direct denial‑of‑service impact has been documented.

Generated by OpenCVE AI on May 8, 2026 at 20:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the mdc800 driver timeout fix.
  • If an update is not immediately available, disable or unload the mdc800 driver from the kernel configuration.
  • Continuously monitor system logs for the "URB submitted while active" warning to verify that the issue no longer occurs.

Generated by OpenCVE AI on May 8, 2026 at 20:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: usb: image: mdc800: kill download URB on timeout mdc800_device_read() submits download_urb and waits for completion. If the timeout fires and the device has not responded, the function returns without killing the URB, leaving it active. A subsequent read() resubmits the same URB while it is still in-flight, triggering the WARN in usb_submit_urb(): "URB submitted while active" Check the return value of wait_event_timeout() and kill the URB if it indicates timeout, ensuring the URB is complete before its status is inspected or the URB is resubmitted. Similar to - commit 372c93131998 ("USB: yurex: fix control-URB timeout handling") - commit b98d5000c505 ("media: rc: iguanair: handle timeouts")
Title usb: image: mdc800: kill download URB on timeout
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-09T04:10:55.876Z

Reserved: 2026-05-01T14:12:56.009Z

Link: CVE-2026-43425

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:54.620

Modified: 2026-05-08T15:16:54.620

Link: CVE-2026-43425

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T21:30:05Z

Weaknesses

No weakness.