Description
In the Linux kernel, the following vulnerability has been resolved:

usb: class: cdc-wdm: fix reordering issue in read code path

Quoting the bug report:

Due to compiler optimization or CPU out-of-order execution, the
desc->length update can be reordered before the memmove. If this
happens, wdm_read() can see the new length and call copy_to_user() on
uninitialized memory. This also violates LKMM data race rules [1].

Fix it by using WRITE_ONCE and memory barriers.
Published: 2026-05-08
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The CDC‑WDM driver in the Linux kernel contains a reordering bug where the descriptor length is updated before a memcpy operation. If the write to the length field is reordered ahead of the memmove, the read handler may see an incorrect length and then call copy_to_user() on memory that has never been initialized. This causes uninitialized kernel data to be copied into user space, potentially exposing sensitive information or causing a crash. The issue also violates Linux Kernel Memory Model data‑race rules, indicating a concurrency flaw.

Affected Systems

All Linux kernel builds that contain the CDC‑WDM driver and lack the patch from the referenced commits are vulnerable. The advisory does not list exact release numbers, but any kernel version prior to the inclusion of the fix is considered at risk.

Risk and Exploitability

The CVSS score of 7.0 indicates a high severity vulnerability, and the EPSS score is 0.00024, indicating a very low probability of exploitation. The flaw is not listed in the CISA KEV catalog. Exploitation would require an attacker to trigger a CDC‑WDM read operation, so the attack vector is inferred to be local or remote device access. While the flaw does not grant remote code execution, it can lead to information disclosure or a denial‑of‑service condition if the user space copy causes a fault.

Generated by OpenCVE AI on May 9, 2026 at 15:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the CDC‑WDM driver fix in the referenced commits.
  • Reboot or reload the kernel modules so the patched driver is in use.
  • If an upgrade is not immediately possible, disable or restrict CDC‑WDM device usage until the patch is applied.

Generated by OpenCVE AI on May 9, 2026 at 15:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-254

Sat, 09 May 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-366
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Fri, 08 May 2026 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-254

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: usb: class: cdc-wdm: fix reordering issue in read code path Quoting the bug report: Due to compiler optimization or CPU out-of-order execution, the desc->length update can be reordered before the memmove. If this happens, wdm_read() can see the new length and call copy_to_user() on uninitialized memory. This also violates LKMM data race rules [1]. Fix it by using WRITE_ONCE and memory barriers.
Title usb: class: cdc-wdm: fix reordering issue in read code path
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:22:00.345Z

Reserved: 2026-05-01T14:12:56.009Z

Link: CVE-2026-43427

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:54.867

Modified: 2026-05-08T15:16:54.867

Link: CVE-2026-43427

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43427 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T16:00:13Z

Weaknesses