CVE-2026-43429
Published: Fri, 08 May 2026 15:16
Summary
In the Linux kernel, the following vulnerability has been resolved: USB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts The usbtmc driver accepts timeout values specified by the us
Details
In the Linux kernel, the following vulnerability has been resolved: USB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts The usbtmc driver accepts timeout values specified by the user in an ioctl command, and uses these timeouts for some usb_bulk_msg() calls. Since the user can specify arbitrarily long timeouts and usb_bulk_msg() uses unkillable waits, call usb_bulk_msg_killable() instead to avoid the possibility of the user hanging a kernel thread indefinitely.
Are YOU affected by CVE-2026-43429?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-43429 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/0535f84cb94c9d8bcba0a2a5b3fac81b7d97235d
- https://git.kernel.org/stable/c/39bd4097292fd8564cf2cfba9356f8ab11e38d12
- https://git.kernel.org/stable/c/6cb7dc91f057dd8ce44f6caa2995d8e22784ed0a
- https://git.kernel.org/stable/c/72c0a063489be183cfb99e7050aaef503bdb6449
- https://git.kernel.org/stable/c/7784caa413a89487dd14dd5c41db8753483b2acb
- https://git.kernel.org/stable/c/7fa72c369c23c27d1f64883c1e276af950557fb1
- https://git.kernel.org/stable/c/d4f1c45bdff3f393f9ab7e76795901c442b9eb76
- https://git.kernel.org/stable/c/e14a0dcdf468c3ad616bb06696c7c64c36e736d8
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.