CVE-2026-43425

Published: Mag 08, 2026 Last Modified: Mag 08, 2026
ExploitDB:
Other exploit source:
Google Dorks:

Description

AI Translation Available

In the Linux kernel, the following vulnerability has been resolved:

usb: image: mdc800: kill download URB on timeout

mdc800_device_read() submits download_urb and waits for completion.
If the timeout fires and the device has not responded, the function
returns without killing the URB, leaving it active.

A subsequent read() resubmits the same URB while it is still
in-flight, triggering the WARN in usb_submit_urb():

'URB submitted while active'

Check the return value of wait_event_timeout() and kill the URB if
it indicates timeout, ensuring the URB is complete before its status
is inspected or the URB is resubmitted.

Similar to
- commit 372c93131998 ('USB: yurex: fix control-URB timeout handling')
- commit b98d5000c505 ('media: rc: iguanair: handle timeouts')

https://git.kernel.org/stable/c/15536f6c15f48037a1672cbdea53266d67861ff6
https://git.kernel.org/stable/c/155f471e38aa516f6c58c2ae03ca3dc222fa2fdb
https://git.kernel.org/stable/c/1be3b77de4eb89af8ae2fd6610546be778e25589
https://git.kernel.org/stable/c/9bf877cc67309b2a063b0087c3ad8585fb11cec3
https://git.kernel.org/stable/c/9fa5a49760979ba016506fe292a431c8b83f043e
https://git.kernel.org/stable/c/b7fed917f84e484e06c5e9926746d0b524e3a93e
https://git.kernel.org/stable/c/cc7398447810c9450c90d092efe9997569f8d96f
https://git.kernel.org/stable/c/d4a400a6a4c4d49f77a04a3f401df5ae1a10657c