CVE-2026-43424
Description
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: f_tcm: Fix NULL pointer dereferences in nexus handling
The tpg->tpg_nexus pointer in the USB Target driver is dynamically managed and tied to userspace configuration via ConfigFS. It can be NULL if the USB host sends requests before the nexus is fully established or immediately after it is dropped.
Currently, functions like bot_submit_command() and the data transfer paths retrieve tv_nexus = tpg->tpg_nexus and immediately dereference tv_nexus->tvn_se_sess without any validation. If a malicious or misconfigured USB host sends a BOT (Bulk-Only Transport) command during this race window, it triggers a NULL pointer dereference, leading to a kernel panic (local DoS).
This exposes an inconsistent API usage within the module, as peer functions like usbg_submit_command() and bot_send_bad_response() correctly implement a NULL check for tv_nexus before proceeding.
Fix this by bringing consistency to the nexus handling. Add the missing if (!tv_nexus) checks to the vulnerable BOT command and request processing paths, aborting the command gracefully with an error instead of crashing the system.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel USB gadget f_tcm driver had NULL pointer dereference in BOT command handling when tpg_nexus is NULL, leading to kernel panic; fixed by adding null checks.
Vulnerability
Description
The Linux kernel's USB gadget f_tcm (Target Core Module) driver contained a NULL pointer dereference vulnerability in the Bulk-Only Transport (BOT) command handling functions. The tpg->tpg_nexus pointer, dynamically managed and tied to userspace configuration via ConfigFS, could be NULL if the USB host sent requests are sent before the nexus is fully established or after it is dropped. Functions like bot_submit_command() retrieved tv_nexus = tpg->tpg_nexus and immediately dereferenced tv_nexus->tvn_se_sess without any validation [1].
Exploitation
Prerequisites
A malicious or misconfigured USB host could exploit this race window by sending BOT commands during the time when the nexus is being set up or torn down. No authentication is required beyond USB connectivity, making this a local denial-of-service vector accessible to an attacker with physical USB access or a compromised host device [1].
Impact
Successful exploitation triggers a NULL pointer dereference, causing a kernel panic (local denial of service). The inconsistent API usage is evident because peer functions like usbg_submit_command() and bot_send_bad_response() correctly implemented NULL checks for tv_nexus before proceeding [1].
Mitigation
The fix introduces the missing if (!tv_nexus) checks into the vulnerable BOT command and request processing paths, aborting the command gracefully with an error instead of crashing. The patch is committed to the Linux kernel stable tree [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/2a2ef846a54a06c33b5c2d4b0d918583e1e7c0b7nvd
- git.kernel.org/stable/c/3d309b37633c4a847fc149939a2c9576f1aa1065nvd
- git.kernel.org/stable/c/679d9535aeb15c10bce89c44102004b96624d706nvd
- git.kernel.org/stable/c/b9b26d7f3aa288cfa54a7bc68612bab1f153f156nvd
- git.kernel.org/stable/c/b9fde507355342a2d64225d582dc8b98ff5ecb19nvd
- git.kernel.org/stable/c/d146f27758049fa55ae4c53785a852d3cf7a18d6nvd
- git.kernel.org/stable/c/f962ca3b020e13d6714f27e8c36fe742441c58d1nvd
News mentions
0No linked articles in our index yet.