Description
In the Linux kernel, the following vulnerability has been resolved:

USB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts

The usbtmc driver accepts timeout values specified by the user in an
ioctl command, and uses these timeouts for some usb_bulk_msg() calls.
Since the user can specify arbitrarily long timeouts and
usb_bulk_msg() uses unkillable waits, call usb_bulk_msg_killable()
instead to avoid the possibility of the user hanging a kernel thread
indefinitely.
Published: 2026-05-08
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The usbtmc driver in the Linux kernel accepts a timeout value from a user via an ioctl call and passes that value directly to usb_bulk_msg(). Because usb_bulk_msg() performs an unkillable wait, an attacker can supply an excessively large timeout, causing a kernel thread to block indefinitely. This creates a denial‑of‑service condition that can stall kernel activity and potentially exhaust system resources.

Affected Systems

The vulnerable driver exists in all Linux kernel releases before the fix, affecting any system that exposes the usbtmc device interface and permits ioctl timeout manipulation.

Risk and Exploitability

The EPSS score of <1% indicates a very low probability of exploitation, and the vulnerability is not listed in CISA’s KEV catalog; the CVSS score of 5.5 indicates a medium‑severity risk due to the potential for a local attacker to hang a kernel thread. The attack vector is local; a user with access to the usbtmc device and the ability to issue the ioctl can trigger the hang. Exploitation requires the attacker to run code that can open the device and send the specified ioctl. Once executed, the kernel thread remains busy until the timeout expires, causing a service interruption for the entire system.

Generated by OpenCVE AI on May 9, 2026 at 15:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that implements usb_bulk_msg_killable() in the usbtmc driver.
  • If an immediate kernel update is not possible, restrict access to the usbtmc device by setting appropriate file permissions or using udev rules to limit ioctl usage to trusted users only.
  • Monitor the kernel logs for patterns of prolonged usbtmc operations and reboot the system if a kernel thread remains blocked for an unusually long period.

Generated by OpenCVE AI on May 9, 2026 at 15:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Sat, 09 May 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 08 May 2026 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400
CWE-770

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: USB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts The usbtmc driver accepts timeout values specified by the user in an ioctl command, and uses these timeouts for some usb_bulk_msg() calls. Since the user can specify arbitrarily long timeouts and usb_bulk_msg() uses unkillable waits, call usb_bulk_msg_killable() instead to avoid the possibility of the user hanging a kernel thread indefinitely.
Title USB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:22:01.739Z

Reserved: 2026-05-01T14:12:56.009Z

Link: CVE-2026-43429

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:55.117

Modified: 2026-05-08T15:16:55.117

Link: CVE-2026-43429

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43429 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T16:00:13Z

Weaknesses