Description
In the Linux kernel, the following vulnerability has been resolved:

usb: yurex: fix race in probe

The bbu member of the descriptor must be set to the value
standing for uninitialized values before the URB whose
completion handler sets bbu is submitted. Otherwise there is
a window during which probing can overwrite already retrieved
data.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Linux kernel contains a race condition in the USB Yurex driver. If the bbu member of the descriptor is not pre‑initialized to a sentinel value before the URB is submitted, the probe routine can overwrite data that has already been retrieved. This flaw, which falls under CWE-367, can corrupt device descriptor structures in kernel memory, potentially causing kernel instability or a denial of service.

Affected Systems

The flaw affects Linux kernel builds that include the Yurex USB driver. No specific kernel version numbers are given in the CVE data, so any kernel prior to the patch referenced in the commit URLs may be vulnerable. The affected product is the Linux kernel, and the vulnerability is present in all distributions that ship an unpatched version of the Yurex driver.

Risk and Exploitability

The EPSS score is < 1%, indicating a very low but non‑zero probability of exploitation. The CVSS score is not available in the CVE data, and the vulnerability is not listed in CISA's KEV catalog, so the quantitative severity remains uncertain. The attack vector requires control over USB device enumeration, implying a local or external threat where the attacker can supply or manipulate a Yurex USB device. Because the race condition operates within privileged kernel code, successful exploitation would need sufficient privilege, but the risk is moderate to high in environments that accept untrusted USB devices and have not applied the kernel update. No publicly available exploit has been disclosed.

Generated by OpenCVE AI on May 9, 2026 at 15:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the Yurex race‑condition patch.
  • If an immediate kernel upgrade is unavailable, disable or blacklist the Yurex driver module to prevent the flaw from being exercised.
  • Monitor kernel logs (e.g., dmesg) for URB completion errors or anomalous descriptor updates and audit USB device enumeration for unexpected activity.
  • Consider restricting USB access with udev rules or system‑wide policies to limit exposure to untrusted devices.

Generated by OpenCVE AI on May 9, 2026 at 15:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362

Sat, 09 May 2026 12:15:00 +0000


Fri, 08 May 2026 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-362

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: usb: yurex: fix race in probe The bbu member of the descriptor must be set to the value standing for uninitialized values before the URB whose completion handler sets bbu is submitted. Otherwise there is a window during which probing can overwrite already retrieved data.
Title usb: yurex: fix race in probe
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-09T04:10:57.407Z

Reserved: 2026-05-01T14:12:56.009Z

Link: CVE-2026-43430

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:55.243

Modified: 2026-05-08T15:16:55.243

Link: CVE-2026-43430

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43430 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T15:30:36Z

Weaknesses