VYPR
Unrated severityNVD Advisory· Published May 8, 2026· Updated May 12, 2026

CVE-2026-43424

CVE-2026-43424

Description

In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_tcm: Fix NULL pointer dereferences in nexus handling

The tpg->tpg_nexus pointer in the USB Target driver is dynamically managed and tied to userspace configuration via ConfigFS. It can be NULL if the USB host sends requests before the nexus is fully established or immediately after it is dropped.

Currently, functions like bot_submit_command() and the data transfer paths retrieve tv_nexus = tpg->tpg_nexus and immediately dereference tv_nexus->tvn_se_sess without any validation. If a malicious or misconfigured USB host sends a BOT (Bulk-Only Transport) command during this race window, it triggers a NULL pointer dereference, leading to a kernel panic (local DoS).

This exposes an inconsistent API usage within the module, as peer functions like usbg_submit_command() and bot_send_bad_response() correctly implement a NULL check for tv_nexus before proceeding.

Fix this by bringing consistency to the nexus handling. Add the missing if (!tv_nexus) checks to the vulnerable BOT command and request processing paths, aborting the command gracefully with an error instead of crashing the system.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel USB gadget f_tcm driver had NULL pointer dereference in BOT command handling when tpg_nexus is NULL, leading to kernel panic; fixed by adding null checks.

Vulnerability

Description

The Linux kernel's USB gadget f_tcm (Target Core Module) driver contained a NULL pointer dereference vulnerability in the Bulk-Only Transport (BOT) command handling functions. The tpg->tpg_nexus pointer, dynamically managed and tied to userspace configuration via ConfigFS, could be NULL if the USB host sent requests are sent before the nexus is fully established or after it is dropped. Functions like bot_submit_command() retrieved tv_nexus = tpg->tpg_nexus and immediately dereferenced tv_nexus->tvn_se_sess without any validation [1].

Exploitation

Prerequisites

A malicious or misconfigured USB host could exploit this race window by sending BOT commands during the time when the nexus is being set up or torn down. No authentication is required beyond USB connectivity, making this a local denial-of-service vector accessible to an attacker with physical USB access or a compromised host device [1].

Impact

Successful exploitation triggers a NULL pointer dereference, causing a kernel panic (local denial of service). The inconsistent API usage is evident because peer functions like usbg_submit_command() and bot_send_bad_response() correctly implemented NULL checks for tv_nexus before proceeding [1].

Mitigation

The fix introduces the missing if (!tv_nexus) checks into the vulnerable BOT command and request processing paths, aborting the command gracefully with an error instead of crashing. The patch is committed to the Linux kernel stable tree [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.