VYPR
Medium severity5.5NVD Advisory· Published May 6, 2026· Updated May 11, 2026

CVE-2026-43255

CVE-2026-43255

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: libertas: fix WARNING in usb_tx_block

The function usb_tx_block() submits cardp->tx_urb without ensuring that any previous transmission on this URB has completed. If a second call occurs while the URB is still active (e.g. during rapid firmware loading), usb_submit_urb() detects the active state and triggers a warning: 'URB submitted while active'.

Fix this by enforcing serialization: call usb_kill_urb() before submitting the new request. This ensures the URB is idle and safe to reuse.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's libertas WiFi driver, usb_tx_block() can trigger a WARNING by submitting an already-active URB, fixed by serializing with usb_kill_urb().

Vulnerability

The function usb_tx_block() in the libertas WiFi driver for USB devices submits cardp->tx_urb without ensuring that any previous transmission on that URB has completed. If a second call occurs while the URB is still active—for example, during rapid firmware loading—usb_submit_urb() detects the active state and triggers a kernel WARNING: "URB submitted while active" [1]. The root cause is a missing serialization mechanism.

Exploitation

An attacker with local access can trigger this condition by causing concurrent calls to usb_tx_block(), such as through rapid firmware loading operations. No special privileges beyond local user access are required, and the attack does not depend on network reachability. The vulnerability is exposed through the libertas driver's interaction with USB devices.

Impact

The kernel WARNING can lead to system instability or a denial-of-service condition, as the warning itself may disrupt normal operation. The CVSS v3 score of 5.5 (Medium) reflects a primarily availability impact, with no direct confidentiality or integrity compromise.

Mitigation

The fix enforces serialization by calling usb_kill_urb() before submitting a new request, ensuring the URB is idle and safe to reuse. This patch has been backported to multiple stable kernel branches [1][2][3][4]. Users should update to the latest stable kernel version to eliminate the warning.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.