CVE-2026-43430
Published: Fri, 08 May 2026 15:16
Summary
In the Linux kernel, the following vulnerability has been resolved: usb: yurex: fix race in probe The bbu member of the descriptor must be set to the value standing for uninitialized values before t
Details
In the Linux kernel, the following vulnerability has been resolved: usb: yurex: fix race in probe The bbu member of the descriptor must be set to the value standing for uninitialized values before the URB whose completion handler sets bbu is submitted. Otherwise there is a window during which probing can overwrite already retrieved data.
Are YOU affected by CVE-2026-43430?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-43430 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://git.kernel.org/stable/c/3cec135415a89723e2d38e1c8cc5098203355965
- https://git.kernel.org/stable/c/687d26d43a5aaf44323ce7d601cf242bb87e9559
- https://git.kernel.org/stable/c/7a875c09899ba0404844abfd8f0d54cdc481c151
- https://git.kernel.org/stable/c/939e3d17b843b0bae70467fef4481069d73c8520
- https://git.kernel.org/stable/c/a41d3d9202e951995cfac6248c565423079c71fa
- https://git.kernel.org/stable/c/a7934d7202a39c3160aa30521c382c7b744ae4a2
- https://git.kernel.org/stable/c/a8b3b3d730acea1640bc89465f2832cf06a1e13a
- https://git.kernel.org/stable/c/af83e92c329f11139d5eea2b5b7b83c26c3f67e7
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.